This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China.
[email protected]
22institutetext: Centre for Quantum Software and Information, University of Technology Sydney, Sydney, Australia.
[email protected]

A Probabilistic Logic for Verifying Continuous-time Markov Chains

Ji Guan 11    Nengkun Yu 22
Abstract

A continuous-time Markov chain (CTMC) execution is a continuous class of probability distributions over states. This paper proposes a probabilistic linear-time temporal logic, namely continuous-time linear logic (CLL), to reason about the probability distribution execution of CTMCs. We define the syntax of CLL on the space of probability distributions. The syntax of CLL includes multiphase timed until formulas, and the semantics of CLL allows time reset to study relatively temporal properties. We derive a corresponding model-checking algorithm for CLL formulas. The correctness of the model-checking algorithm depends on Schanuel’s conjecture, a central open problem in transcendental number theory. Furthermore, we provide a running example of CTMCs to illustrate our method.

1 Introduction

As a popular model of probabilistic continuous-time systems, continuous-time Markov chains (CTMCs) have been extensively studied since Kolmogorov [1]. In the recent 20 years, probabilistic continuous-time model checking receives much attention. Adopting probabilistic computational tree logic (PCTL) [2] to this context with extra multiphase timed until formulas Φ1U𝒯1Φ2U𝒯KΦK+1\Phi_{1}U^{\mathcal{T}_{1}}\Phi_{2}\cdots U^{\mathcal{T}_{K}}\Phi_{K+1}, for state formula Φ\Phi and time interval 𝒯\mathcal{T}, Aziz et al. proposed continuous stochastic logic (CSL) to specify the branching-time properties of CTMCs and the model-checking problem for CSL is decidable [3]. After that, efficient model-checking algorithms were developed by transient analysis of CTMCs using uniformization [4] and stratification [5] for a restricted version (path formulas are restricted to single until formulas Φ1UΦ2\Phi_{1}U^{\mathcal{I}}\Phi_{2}) and a full version of CSL, respectively. These algorithms have been practically implemented in model checkers PRISM [6], MRMC [7] and STORM [8]. Further details can be found in an excellent survey [9].

There are also different ways to specify the linear-time properties of CTMCs. Timed automata were first used to achieve this task [10, 11, 12, 13, 14], and then metric temporal logic (MTL) [15] was also considered in this context. Subsequently, the probability of “the system being in state s0s_{0} within five-time units after having continuously remained in state s1s_{1}” can be computed. However, some statements cannot be specified and verified because of the lack of a probabilistic linear-time temporal logic, for instance “the system being in state s0s_{0} with high probability (0.9\geq 0.9) within five-time units after having continuously remained in state s1s_{1} with low probability (0.1\leq 0.1)”. Furthermore, this probabilistic property cannot be expressed by CSL because CSL cannot express properties that are defined across several state transitions of the same time length in the execution of a CTMC.

In this paper, targeting to express the mentioned probabilistic linear-time properties, we introduce continuous-time linear logic (CLL). In particular, we adopt the viewpoint used in  [16] by regarding CTMCs as transformers of probability distributions over states. CLL studies the properties of the probability distribution execution generated by a given initial probability distribution over time. By the fundamental difference between the views of state executions and probability distribution executions of CTMCs, CLL and CSL are incomparable and complementary, as the relation between probabilistic linear-time temporal logic (PLTL) and PCTL in model checking discrete-time Markov chains [16, Section 3.3].

The atomic propositions of CLL are explained on the space of probability distributions over states of CTMCs. We apply the method of symbolic dynamics to the probability distributions of CTMCs. To be specific, we symbolize the probability value space [0,1][0,1] into a finite set of intervals ={k[0,1]}k=1m\mathscr{I}=\{\mathcal{I}_{k}\subseteq[0,1]\}_{k=1}^{m}. A probability distribution μ\mu over its set of states S={s0,s2,,sd1}S=\{s_{0},s_{2},\ldots,s_{d-1}\} is then represented symbolically as a set of symbols

𝕊(μ)={s,S×:μ(s)}\mathbb{S}(\mu)=\{\langle s,\mathcal{I}\rangle\in S\times\mathscr{I}:\mu(s)\in\mathcal{I}\}

where each symbol s,\langle s,\mathcal{I}\rangle asserts μ(s)\mu(s)\in\mathcal{I}, i.e., the probability of state ss in distribution μ\mu falls in interval \mathcal{I}. For example, s0,[0.9,1]\langle s_{0},[0.9,1]\rangle means the system is in state s0s_{0} with a probability in 0.90.9 to 11. The symbolization idea of distributions has been considered in [16]: choosing a disjoint cover of [0,1][0,1]:

={[0,p1),[p1,p2),,[pn,1]}.\mathcal{I}=\{[0,p_{1}),[p_{1},p_{2}),...,[p_{n},1]\}.

Here, we remove this restriction and enrich the expressiveness of \mathscr{I}. A crucial fact about this symbolization is that the set S×S\times\mathscr{I} is finite. Consequently, the (probability distribution) execution path generated by an initial probability distribution μ\mu induces a sequence of symbols in S×S\times\mathscr{I} over time. Therefore, the dynamics of CTMCs can be studied in terms of a (real-time) language over the alphabet S×S\times\mathscr{I}, which is the set of atomic propositions of CLL.

Different from non-probabilistic linear-time temporal logics — linear-time temporal logic (LTL) and MTL, CLL has two types of formulas: state formulas and path formulas. The state formulas are constructed using propositional connectives. The path formulas are obtained by propositional connectives and a temporal modal operator timed until U𝒯U^{\mathcal{T}} for a bounded time interval 𝒯\mathcal{T}, as in MTL and CSL. The standard next-step temporal operator in LTL is meaningless in continuous-time systems since the time domain (real numbers) is uncountable. As a result, CLL can express the above mentioned probabilistic property “the system is at state s0s_{0} with high probability (0.9\geq 0.9) within 5 time units after having continuously remained at state s1s_{1} with low probability (0.1\leq 0.1)” in a path formula:

φ=s1,[0,0.1]U[0,5]s0,[0.9,1].\varphi=\langle s_{1},[0,0.1]\rangle U^{[0,5]}\langle s_{0},[0.9,1]\rangle.

In this single until formula, there is a time instant 0t50\leq t\leq 5 at which state s1s_{1} with low probability transits to state s0s_{0} with high probability. Then we illustrate this on the following timeline.

s1,[0,0.1]\underbrace{\hskip 85.35826pt}_{\langle s_{1},[0,0.1]\rangle}t5\downarrow{t\leq 5}0\downarrow 0 s0,[0.9,1]\uparrow\langle s_{0},[0.9,1]\rangle

Furthermore, CLL allows multiphase timed until formulas. The semantics of the formulas focuses on relative time intervals, i.e., time can be reset as in timed automata [17, 18], while those of CSL [3] are for absolute time intervals. Subsequently, CLL can express not only relatively but also absolutely temporal properties of CTMCs.

We illustrate the significant difference between relatively temporal properties and absolutely temporal properties of CTMCs. For instance, “before probability distributions transition φ\varphi happening in 3 to 7 time units, the system always stays at state s0s_{0} with a high probability (0.9)(\geq 0.9)” can be formalized in path formulae

φ=s0,[0.9,1]U[3,7](s1,[0,0.1]U[0,5]s0,[0.9,1]).\varphi^{\prime}=\langle s_{0},[0.9,1]\rangle U^{[3,7]}(\langle s_{1},[0,0.1]\rangle U^{[0,5]}\langle s_{0},[0.9,1]\rangle).

As we can see, there are two time instants, namely t1t_{1} and t2t_{2}, happening distribution transitions. Time is reset to 0 after the first distribution transition happens and thus t2t_{2} is relative to t1t_{1}. More clearly, we depict this on the following timeline.

s0,[0.9,1]\underbrace{\hskip 56.9055pt}_{\langle s_{0},[0.9,1]\rangle}s1,[0,0.1]\underbrace{\hskip 85.35826pt}_{\langle s_{1},[0,0.1]\rangle}(t2+t1)12\downarrow{(t_{2}+t_{1})\leq 12}=3\overbrace{\hskip 71.13188pt}^{=3}\uparrow 0st17\downarrow t_{1}\leq 7 s0,[0.9,1]\uparrow\langle s_{0},[0.9,1]\rangle

An absolute version is “probability distribution transition φ\varphi happens and the system always stays at state s0s_{0} with a high probability (\geq 0.9) in 3 to 7 time units”

φ′′=[3,7]s0,[0.9,1]s1,[0,0.1]U[0,5]s0,[0.9,1]).\varphi^{\prime\prime}=\Box^{[3,7]}\langle s_{0},[0.9,1]\rangle\land\langle s_{1},[0,0.1]\rangle U^{[0,5]}\langle s_{0},[0.9,1]\rangle).

We can get a clear timeline representation by simply adding [3,7]s0,[0.9,1]\Box^{[3,7]}\langle s_{0},[0.9,1]\rangle to that of φ\varphi. Assume that t<3t<3,

s1,[0,0.1]\underbrace{\hskip 85.35826pt}_{\langle s_{1},[0,0.1]\rangle}t<3\downarrow{t<3}0\downarrow 0 s0,[0.9,1]\uparrow\langle s_{0},[0.9,1]\rangle 3\downarrow 3 7\downarrow 7 s0,[0.9,1]\underbrace{\hskip 156.49014pt}_{\langle s_{0},[0.9,1]\rangle}

Time reset enriches the expressiveness of CLL but introduces more difficulties to model checking CLL than CSL. We cross this by translating relative time to the absolute one. As a result, we develop an algorithm to model check CTMCs against CLL formulas. More precisely, we reduce the model-checking problem to a reachability problem of absolute time intervals. The reachability problem corresponds to the real root isolation problem of real polynomial-exponential functions (PEFs) over the field of algebraic numbers, an extensively studied question in recent symbolic and algebraic computation community (e.g. [19, 20, 21]). By developing a state-of-the-art real root isolation algorithm, we resolve the latter problem under the assumption of the validity of Schanuel’s conjecture, a central open question in transcendental number theory [22]. This conjecture has also been the footstone of the correctness of many recent model-checking algorithms, including the decidability of continuous-time Markov decision processes [23], the synthesizing inductive invariants for continuous linear dynamical systems [24], the termination analysis for probabilistic programs with delays [25], and reachability analysis for dynamical systems [20].

In summary, the main contributions of this paper are as follows.

  • Introducing a probabilistic logic, namely continuous-time linear logic (CLL), for reasoning about CTMCs;

  • Developing a state-of-the-art real root isolation algorithm for PEFs over the field of algebraic numbers for checking atomic propositions of CLL;

  • Proving that model checking CTMCs against CLL formulas is decidable subject to Schanuel’s conjecture.

Organization of this paper. In the next section, we give the mathematical preliminaries used in this paper. In Section 3, we recall the view of CTMCs as distribution transformers. After that, the symbolic dynamics of CTMCs are introduced by symbolizing distributions over states of CTMCs in Section 4. In the subsequent section, we present our continuous-time probabilistic temporal logic CLL. In Section 6, we develop an algorithm to solve the CLL model checking problem. A case study and related works are shown in Sections 7 and 8, respectively. We summarize our results and point out future research directions in the final section.

2 Preliminaries

For the convenience of the readers, we review basic definitions and notations of number theory, particularly Schanuel’s conjecture.

Throughout this paper, we write ,,\mathbb{C},\mathbb{R},\mathbb{Q} and 𝔸\mathbb{A} for the fields of all complex, real, rational and algebraic numbers, respectively. In addition, \mathbb{Z} denotes the set of all integer numbers. For 𝔽{,,,,𝔸}\mathbb{F}\in\{\mathbb{C},\mathbb{R},\mathbb{Q},\mathbb{Z},\mathbb{A}\}, we use 𝔽[t]\mathbb{F}[t] and 𝔽n×m\mathbb{F}^{n\times m} to denote the set of polynomials in tt with coefficients in 𝔽\mathbb{F} and nn-by-mm matrices with every entry in 𝔽\mathbb{F}, respectively. Furthermore, for 𝔽{,,}\mathbb{F}\in\{\mathbb{R},\mathbb{Q},\mathbb{Z}\}, we use 𝔽+\mathbb{F}^{+} to denote the set of positive elements (including 0) of 𝔽\mathbb{F}.

A bounded (time) interval 𝒯\mathcal{T} is a subset of +\mathbb{R}^{+}, which may be open, half-open or closed with one of the following forms:

[t1,t2],[t1,t2),(t1,t2],(t1,t2),[t_{1},t_{2}],[t_{1},t_{2}),(t_{1},t_{2}],(t_{1},t_{2}),

where t1,t2+t_{1},t_{2}\in\mathbb{R}^{+} and t2t1t_{2}\geq t_{1} (t1=t2t_{1}=t_{2} is only allowed in the case of [t1,t2][t_{1},t_{2}]). Here, t1t_{1} and t2t_{2} are called the left and right endpoints of 𝒯\mathcal{T}, respectively. Conveniently, we use inf𝒯\inf\mathcal{T} and sup𝒯\sup\mathcal{T} to denote t1t_{1} and t2t_{2}, respectively. In this paper, we only consider bounded intervals.

For reasoning about the temporal properties, we further define the addition and subtraction of (time) intervals. The expression 𝒯+t\mathcal{T}+t or t+𝒯t+\mathcal{T}, for t+t\in\mathbb{R}^{+}, denotes the interval {t+t:t𝒯}\{t+t^{\prime}:t^{\prime}\in\mathcal{T}\}. Similarly, 𝒯t\mathcal{T}-t stands for the interval {t+t:t𝒯}\{-t+t^{\prime}:t^{\prime}\in\mathcal{T}\} if tinf𝒯t\leq\inf\mathcal{T}. Furthermore, for two intervals 𝒯1\mathcal{T}_{1} and 𝒯2\mathcal{T}_{2},

𝒯1+𝒯2={t(t+𝒯2):t𝒯1}={t1+t2:t1𝒯1 and t2𝒯2}.\mathcal{T}_{1}+\mathcal{T}_{2}=\{t\in(t^{\prime}+\mathcal{T}_{2}):t^{\prime}\in\mathcal{T}_{1}\}=\{t_{1}+t_{2}:t_{1}\in\mathcal{T}_{1}\textrm{ and }t_{2}\in\mathcal{T}_{2}\}.

Two intervals 𝒯1\mathcal{T}_{1} and 𝒯2\mathcal{T}_{2} are disjoint if their intersection is an empty set, i.e., 𝒯1𝒯2=\mathcal{T}_{1}\cap\mathcal{T}_{2}=\emptyset. Let us see some concrete examples: 1+(2,3)=(3,4)1+(2,3)=(3,4), (2,3)1=(1,2)(2,3)-1=(1,2), (2,3)+[3,4]=(5,7)(2,3)+[3,4]=(5,7) and (2,3),[3,4](2,3),[3,4] are disjoint. It is obvious that all calculations of time intervals in the above are easy to be computed.

An algebraic number is a complex number that is a root of a non-zero polynomial in one variable with rational coefficients (or equivalent to integer coefficients, by eliminating denominators). An algebraic number α\alpha is represented by (P,(a,b),ε)(P,(a,b),\varepsilon) where PP is the minimal polynomial of α\alpha, a,ba,b\in\mathbb{Q} and a+bia+bi is an approximation of α\alpha such that |α(a+bi)|<ε|\alpha-(a+bi)|<\varepsilon and α\alpha is the only root of PP in the open ball B(a+bi,ε)B(a+bi,\varepsilon). The minimal polynomial of α\alpha is the polynomial with the smallest degree in [t]\mathbb{Q}[t] such that α\alpha is a root of the polynomial and the coefficient of the highest-degree term is 1. Any root of f(t)𝔸[t]f(t)\in\mathbb{A}[t] is algebraic. Moreover, given the representations of a,b𝔸a,b\in\mathbb{A}, the representations of a±b,aba\pm b,\frac{a}{b} and aba\cdot b can be computed in polynomial time, so does the equality checking [26].

Furthermore, a complex number is called transcendental if it is not an algebraic number. In general, it is challenging to verify relationships between transcendental numbers [27]. On the other hand, one can use the Lindemann-Weierstrass theorem to compare some transcendental numbers. The transcendence of ee and π\pi are direct corollaries of this theorem.

Theorem 2.1 (Lindemann-Weierstrass theorem)

Let η1,,ηn\eta_{1},\cdots,\eta_{n} be pairwise distinct algebraic complex numbers. Then kλkeηk0\sum_{k}\lambda_{k}e^{\eta_{k}}\neq 0 for non-zero algebraic numbers λ1,,λn\lambda_{1},\cdots,\lambda_{n}.

The following concepts are introduced to study the general relation between transcendental numbers.

Definition 1 (Algebraic independence)

A set of complex numbers S={a1,,an}S=\{a_{1},\cdots,a_{n}\} is algebraically independent over \mathbb{Q} if the elements of SS do not satisfy any nontrivial (non-constant) polynomial equation with coefficients in \mathbb{Q}.

By the above definition, for any transcendental number uu, {u}\{u\} is algebraically independent over \mathbb{Q}, while {a}\{a\} for any algebraic number a𝔸a\in\mathbb{A} is not. Thus, a set of complex numbers that is algebraically independent over \mathbb{Q} must consist of transcendental numbers. {π,eπn}\{\pi,e^{\pi\sqrt{n}}\} is also algebraically independent over \mathbb{Q} for any positive integer nn [28]. Checking the algebraic independence is challenging. For example, it is still widely open whether {e,π}\{e,\pi\} is algebraically independent over \mathbb{Q}.

Definition 2 (Extension field)

Given two fields EFE\subseteq F, FF is an extension field of EE, denoted by F/EF/E, if the operations of EE are those of FF restricted to EE.

For example, under the usual notions of addition and multiplication, the field of complex numbers is an extension field of real numbers.

Definition 3 (Transcendence degree)

Let LL be an extension field of \mathbb{Q}, the transcendence degree of LL over \mathbb{Q} is defined as the largest cardinality of an algebraically independent subset of LL over \mathbb{Q}.

For instance, let (e)/={a+bea,b}\mathbb{Q}(e)/\mathbb{Q}=\{a+be\mid a,b\in\mathbb{Q}\} and (2)/={a+b2a,b}\mathbb{Q}(\sqrt{2})/\mathbb{Q}=\{a+b\sqrt{2}\mid a,b\in\mathbb{Q}\} be two extension fields of \mathbb{Q}. Then the transcendence degree of them are 11 and 0, respectively, by noting that ee is a transcendental number and 2\sqrt{2} is an algebraic number.

Now, Schanuel’s conjecture is ready to be presented.

Conjecture 1 (Schanuel’s conjecture)

Given any complex numbers z1,,znz_{1},\cdots,z_{n} that are linearly independent over \mathbb{Q}, the extension field (z1,,zn,ez1,,ezn)\mathbb{Q}(z_{1},...,z_{n},e^{z_{1}},...,e^{z_{n}}) has transcendence degree of at least nn over \mathbb{Q}.

Stephen Schanuel proposed this conjecture during a course given by Serge Lang at Columbia in the 1960s [22]. Schanuel’s conjecture concerns the transcendence degree of certain field extensions of the rational numbers. The conjecture, if proven, would generalize the most well-known results in transcendental number theory significantly [29, 30]. For example, the algebraical independence of {e,π}\{e,\pi\} would simply follow by setting z1=1z_{1}=1 and z2=πiz_{2}=\pi i, and using Euler’s identity eπi+1=0e^{\pi i}+1=0.

3 Continuous-time Markov Chains as Distributions Transformers

We begin with the definition of continuous-time Markov chains (CTMCs). A CTMC is a Markovian (memoryless) stochastic process that takes values on a finite state set SS (|S|=d<|S|=d<\infty) and evolves in continuous-time t+t\in\mathbb{R}^{+}. Formally,

Definition 4

A CTMC is a pair =(S,Q)\mathcal{M}=(S,Q), where SS (|S|=d|S|=d) is a finite state set and Qd×dQ\in\mathbb{Q}^{d\times d} is a transition rate matrix.

A transition rate matrix QQ is a matrix whose off-diagonal entries {Qi,j}ij\{Q_{i,j}\}_{i\not=j} are nonnegative rational numbers, representing the transition rate from state ii to state jj, while the diagonal entries {Qj,j}\{Q_{j,j}\} are constrained to be jiQi,j-\sum_{j\not=i}Q_{i,j} for all 1jd1\leq j\leq d. Consequently, the column summations of QQ are all zero.

The evolution of a CTMC can be regarded as a distribution transformer. Given initial distribution μd×1𝒟(𝒮)\mu\in\mathbb{Q}^{d\times 1}\in\mathcal{D(S)}, the distribution at time t+t\in\mathbb{R}^{+} is:

μt=eQtμ,\mu_{t}=e^{Qt}\mu,

where 𝒟(𝒮)\mathcal{D(S)} is denoted as the set of all probability distributions over SS. We call 𝒟(𝒮)\mathcal{D(S)} the probability distribution space of CTMCs. An execution path of CTMCs is a continuous function indexed by initial distribution μ𝒟(𝒮)\mu\in\mathcal{D(S)}:

σμ:+𝒟(𝒮),σμ(t)=eQtμ.\sigma_{\mu}\colon\mathbb{R}^{+}\rightarrow\mathcal{D(S)},\qquad\sigma_{\mu}(t)=e^{Qt}\mu. (1)
Example 1

We recall the illustrating example of CTMC =(S,Q)\mathcal{M}=(S,Q) in [3, Figure 1] as the running example in our work. In particular, \mathcal{M} is a 5-dimensional CTMC with initial distribution μ\mu, where S={s0,s1,s2,s3,s4}S=\{s_{0},s_{1},s_{2},s_{3},s_{4}\} and

Q=(3000010000207000030000400)μ=(0.10.20.30.40).Q=\left(\begin{matrix}-3&0&0&0&0\\ 1&0&0&0&0\\ 2&0&-7&0&0\\ 0&0&3&0&0\\ 0&0&4&0&0\end{matrix}\right)\qquad\mu=\left(\begin{matrix}0.1\\ 0.2\\ 0.3\\ 0.4\\ 0\end{matrix}\right).

4 Symbolic Dynamics of CTMCs

In this section, we introduce symbolic dynamics to characterize the properties of the probability distribution space of CTMCs.

First, we fix a finite set of intervals ={k[0,1]}kK\mathscr{I}=\{\mathcal{I}_{k}\subseteq[0,1]\}_{k\in K}, where the endpoints of each k\mathcal{I}_{k} are rational numbers. With the states S={s0,s1,,sd1}S=\{s_{0},s_{1},\cdots,s_{d-1}\}, we define the symbolization of distributions as a function:

𝕊:𝒟(𝒮)2S×𝕊(μ)={s,S×:μ(s)},\mathbb{S}:\mathcal{D(S)}\rightarrow 2^{S\times\mathscr{I}}\qquad\mathbb{S}(\mu)=\{\langle s,\mathcal{I}\rangle\in S\times\mathscr{I}:\mu(s)\in\mathcal{I}\}, (2)

where ×\times denotes the Cartesian product, and 2S×2^{S\times\mathscr{I}} is the power set of S×S\times\mathscr{I}. s,𝕊(μ)\langle s,\mathcal{I}\rangle\in\mathbb{S}(\mu) asserts that the probability of state s in distribution μ\mu is in the interval \mathcal{I}. The symbolization of distributions is a generalization of the discretization of distributions with km=\mathcal{I}_{k}\cap\mathcal{I}_{m}=\emptyset for all kmk\not=m which was studied in [16]. This generalization increases the expressiveness of our continuous linear-time logic introduced in the next section. Now, we can represent any given probability distribution by finite symbols from S×S\times\mathscr{I}. For example, suppose

={[0,0.1],(0.1,0.9),[0.9,1],[1,1],[0.4,0.4]},\mathscr{I}=\{[0,0.1],(0.1,0.9),[0.9,1],[1,1],[0.4,0.4]\}, (3)

and then the initial distribution μ\mu in Example 1 is symbolized as

𝕊(μ)={\displaystyle\mathbb{S}(\mu)=\{ s0,[0,0.1],s1,(0.1,0.9),s2,(0.1,0.9),\displaystyle\langle s_{0},[0,0.1]\rangle,\langle s_{1},(0.1,0.9)\rangle,\langle s_{2},(0.1,0.9)\rangle, (4)
s3,(0.1,0.9),s3,[0.4,0.4],s4,[0,0.1]}.\displaystyle\langle s_{3},(0.1,0.9)\rangle,\langle s_{3},[0.4,0.4]\rangle,\langle s_{4},[0,0.1]\rangle\}.

As we can see from the above example, the symbolization of distributions on states considers the exact probabilities (singleton intervals) of the states and the range of their possibilities.

Next, we introduce the symbolization to CTMCs,

Definition 5

A symbolized CTMC is a tuple 𝒮=(S,Q,)\mathcal{SM}=(S,Q,\mathscr{I}), where =(S,Q)\mathcal{M}=(S,Q) is a CTMC and \mathscr{I} is a finite set of intervals in [0,1][0,1].

As we can see, the set of intervals is picked depending on CTMCs. Then, we extend this symbolization to the path σμ\sigma_{\mu}:

𝕊σμ:+2S×.\mathbb{S}\circ\sigma_{\mu}:\mathbb{R}^{+}\rightarrow 2^{S\times\mathscr{I}}. (5)
Definition 6

Given a symbolized CTMC 𝒮=(S,Q,)\mathcal{SM}=(S,Q,\mathscr{I}), 𝕊σμ\mathbb{S}\circ\sigma_{\mu} is a symbolic execution path of =(S,Q)\mathcal{M}=(S,Q).

Given a symbolized CTMC 𝒮=(S,Q,)\mathcal{SM}=(S,Q,\mathscr{I}), the path σμ\sigma_{\mu} of CTMC =(S,Q)\mathcal{M}=(S,Q) over real numbers +\mathbb{R}^{+} generated by probability distribution μ\mu induces a symbolic execution path 𝕊σμ\mathbb{S}\circ\sigma_{\mu} over finite symbols S×S\times\mathscr{I}. Subsequently, the dynamics of CTMCs can be studied in terms of a language over S×S\times\mathscr{I}. In other words, we can study the temporal properties of CTMCs in the context of symbolized CTMCs.

5 Continuous Linear-time Logic

In this section, we introduce continuous linear-time logic (CLL), a probabilistic linear-time temporal logic, to specify the temporal properties of a symbolized CTMC 𝒮=(S,Q,)\mathcal{SM}=(S,Q,\mathscr{I}).

CLL has two types of formulas: state formulas and path formulas. The state formulas are constructed using propositional connectives. The path formulas are obtained by propositional connectives and a temporal modal operator timed until U𝒯U^{\mathcal{T}} for a bounded time interval 𝒯\mathcal{T}, as in MTL and CSL. Furthermore, multiphase timed until formulas Φ0U𝒯1Φ1U𝒯2Φ2U𝒯nΦn\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\ldots U^{\mathcal{T}_{n}}\Phi_{n} are allowed to enrich the expressiveness of CLL. More importantly, time reset is involved in these multiphase formulas. Thus absolutely and relatively temporal properties of CTMCs can be studied.

Definition 7

The state formulas of CLL are described according to the following syntax:

Φ:=𝐭𝐫𝐮𝐞aAP¬ΦΦ1Φ2\Phi:=\mathbf{true}\mid a\in AP\mid\neg\Phi\mid\Phi_{1}\land\Phi_{2}

where APAP denotes S×S\times\mathscr{I} as the set of atomic propositions.

The path formulas of CLL are constructed by the following syntax:

φ:=𝐭𝐫𝐮𝐞Φ0U𝒯1Φ1U𝒯2Φ2U𝒯nΦn¬φφ1φ2\varphi:=\mathbf{true}\mid\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\ldots U^{\mathcal{T}_{n}}\Phi_{n}\mid\neg\varphi\mid\varphi_{1}\land\varphi_{2}

where n+n\in\mathbb{Z}^{+} is a positive integer, for all 0kn0\leq k\leq n, Φk\Phi_{k} is a state formula, and 𝒯k\mathcal{T}_{k}’s are time intervals with the endpoints in +\mathbb{Q}^{+}, i.e., each 𝒯k\mathcal{T}_{k} is one of the following forms:

(a,b),[a,b],(a,b],[a,b)a,b+.(a,b),[a,b],(a,b],[a,b)\qquad\forall a,b\in\mathbb{Q}^{+}.

The semantics of CLL state formulas is defined on the set 𝒟(𝒮)\mathcal{D(S)} of probability distributions over SS with the symbolized function 𝕊\mathbb{S} in Eq.(2) of Section 4.

  • (1)

    μ𝐭𝐫𝐮𝐞\mu\models\mathbf{true} for all probability distributions μ𝒟(𝒮)\mu\in\mathcal{D(S)};

  • (2)

    μa\mu\models a iff a𝕊(μ)a\in\mathbb{S}(\mu);

  • (3)

    μ¬Φ\mu\models\neg\Phi iff it is not the case that μΦ\mu\models\Phi (or written μ⊧̸Φ\mu\not\models\Phi );

  • (4)

    μΦ1Φ2\mu\models\Phi_{1}\land\Phi_{2} iff μΦ1\mu\models\Phi_{1} and μΦ2\mu\models\Phi_{2}.

The semantics of CLL path formulas is defined on execution paths {σμ}μ𝒟(𝒮)\{\sigma_{\mu}\}_{\mu\in\mathcal{D(S)}} of CTMC =(S,Q)\mathcal{M}=(S,Q).

  • (1)

    σμ𝐭𝐫𝐮𝐞\sigma_{\mu}\models\mathbf{true} for all probability distributions μ𝒟(𝒮)\mu\in\mathcal{D(S)};

  • (2)

    σμΦ0U𝒯1Φ1U𝒯2Φ2U𝒯nΦn\sigma_{\mu}\models\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\ldots U^{\mathcal{T}_{n}}\Phi_{n} iff there is a time instant t𝒯1t\in\mathcal{T}_{1} such that σμtΦ1U𝒯2Φ2U𝒯nΦn\sigma_{\mu_{t}}\models\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\ldots U^{\mathcal{T}_{n}}\Phi_{n}, and for any t𝒯1[0,t)t^{\prime}\in\mathcal{T}_{1}\cap[0,t), μtΦ0{\mu_{t^{\prime}}}\models\Phi_{0}, where σμtΦ\sigma_{\mu_{t}}\models\Phi iff μtΦ\mu_{t}\models\Phi, and μt\mu_{t} is the distribution of the chain at time instant tt, i.e., μt=eQtμt+\mu_{t}=e^{Qt}\mu\ \forall t\in\mathbb{R}^{+};

  • (3)

    σμ¬φ\sigma_{\mu}\models\neg\varphi iff it is not the case that σμφ\sigma_{\mu}\models\varphi (written σμ⊧̸φ\sigma_{\mu}\not\models\varphi );

  • (4)

    σμφ1φ2\sigma_{\mu}\models\varphi_{1}\land\varphi_{2} iff σμφ1\sigma_{\mu}\models\varphi_{1} and σμφ2\sigma_{\mu}\models\varphi_{2}.

Not surprisingly, other Boolean connectives are derived in the standard way, i.e., 𝐟𝐚𝐥𝐬𝐞=¬𝐭𝐫𝐮𝐞\mathbf{false}=\neg\mathbf{true}, Φ1Φ2=¬(¬Φ1¬Φ2)\Phi_{1}\lor\Phi_{2}=\neg(\neg\Phi_{1}\land\neg\Phi_{2}) and Φ1Φ2=¬Φ1Φ2,\Phi_{1}\rightarrow\Phi_{2}=\neg\Phi_{1}\lor\Phi_{2}, and the path formula φ\varphi follows the same way. Furthermore, we generalize temporal operators \Diamond (“eventually”) and \Box (“always”) of discrete-time systems into their timed variant 𝒯\Diamond^{\mathcal{T}} and 𝒯\Box^{\mathcal{T}}, respectively, in the following:

𝒯Φ=𝐭𝐫𝐮𝐞U𝒯Φ𝒯Φ=¬𝒯¬Φ.\Diamond^{\mathcal{T}}\Phi=\mathbf{true}U^{\mathcal{T}}\Phi\qquad\Box^{\mathcal{T}}\Phi=\neg\Diamond^{\mathcal{T}}\neg\Phi.

For n=1n=1 in multiphase timed until formulas, the until operator U𝒯1U^{\mathcal{T}_{1}} is a timed variant of the until operator of LTL; the path formula Φ0U𝒯1Φ1\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1} asserts that Φ1\Phi_{1} is satisfied at some time instant in the interval 𝒯1\mathcal{T}_{1} and that at all preceding time instants in 𝒯1\mathcal{T}_{1}, Φ0\Phi_{0} holds. For example,

φ=s1,[0,0.1]U[0,5]s0,[0.9,1],\varphi=\langle s_{1},[0,0.1]\rangle U^{[0,5]}\langle s_{0},[0.9,1]\rangle,

as mentioned in introduction section.

For general nn, the CLL path formula Φ0U𝒯1Φ1U𝒯2Φ2U𝒯nΦn\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\ldots U^{\mathcal{T}_{n}}\Phi_{n} is explained over the induction on nn. We first mention that U𝒯U^{\mathcal{T}} is right-associative, e.g., Φ0U𝒯1Φ1U𝒯2Φ2\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2} stands for Φ0U𝒯1(Φ1U𝒯2Φ2)\Phi_{0}U^{\mathcal{T}_{1}}(\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}). This makes time reset, i.e., 𝒯1\mathcal{T}_{1} and 𝒯2\mathcal{T}_{2} do not have to be disjoint, and the starting time point of 𝒯2\mathcal{T}_{2} is based on some time instant in 𝒯1\mathcal{T}_{1}. Recall the multiphase timed until formula in introduction section and this formula expresses a relative time property:

φ=s0,[0.9,1]U[3,7](s1,[0,0.1]U[0,5]s0,[0.9,1]),\varphi^{\prime}=\langle s_{0},[0.9,1]\rangle U^{[3,7]}(\langle s_{1},[0,0.1]\rangle U^{[0,5]}\langle s_{0},[0.9,1]\rangle),

which is different to the following CLL path formula representing an absolutely temporal property of CTMCs:

φ′′=[3,7]s0,[0.9,1]s1,[0,0.1]U[0,5]s0,[0.9,1]).\varphi^{\prime\prime}=\Box^{[3,7]}\langle s_{0},[0.9,1]\rangle\land\langle s_{1},[0,0.1]\rangle U^{[0,5]}\langle s_{0},[0.9,1]\rangle).

As an example, we clarify the semantics of CLL by comparing the above two path formulas in general forms:

Φ0U𝒯1Φ1U𝒯2Φ2 and Φ0U𝒯1Φ1Φ1U𝒯2Φ2.\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\ \text{ and }\ \Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}\land\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}.
  • (1)

    σμΦ0U𝒯1Φ1U𝒯2Φ2\sigma_{\mu}\models\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2} asserts that there are time instants t1𝒯1,t2𝒯2t_{1}\in\mathcal{T}_{1},t_{2}\in\mathcal{T}_{2} such that μt1+t2Φ2\mu_{t_{1}+t_{2}}\models\Phi_{2} and for any t1𝒯1[0,t1)t_{1}^{\prime}\in\mathcal{T}_{1}\cap[0,t_{1}) and t2𝒯2[0,t2)t_{2}^{\prime}\in\mathcal{T}_{2}\cap[0,t_{2}), μt1Φ0\mu_{t_{1}^{\prime}}\models\Phi_{0} and μt1+t2Φ1\mu_{t_{1}+t_{2}^{\prime}}\models\Phi_{1}, where μt=eQtμt+.\mu_{t}=e^{Qt}\mu\ \forall t\in\mathbb{R}^{+}. This is more clear in the following timeline.

    Φ0\underbrace{\hskip 56.9055pt}_{\Phi_{0}}Φ1\underbrace{\hskip 28.45274pt}_{\Phi_{1}}=inf𝒯2\overbrace{\hskip 71.13188pt}^{=\inf\mathcal{T}_{2}}Φ2\downarrow{\Phi_{2}}=inf𝒯1\overbrace{\hskip 54.06006pt}^{=\inf\mathcal{T}_{1}}\uparrow time 0t1sup𝒯1\uparrow t_{1}\leq\sup\mathcal{T}_{1} (t1+t2)sup(𝒯1+𝒯2)\uparrow(t_{1}+t_{2})\leq\sup(\mathcal{T}_{1}+\mathcal{T}_{2})
  • (2)

    σμΦ0U𝒯1Φ1Φ1U𝒯2Φ2\sigma_{\mu}\models\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}\land\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2} asserts that there are time instants t1𝒯1,t2𝒯2t_{1}\in\mathcal{T}_{1},t_{2}\in\mathcal{T}_{2} such that μt1Φ1\mu_{t_{1}}\models\Phi_{1} and μt2Φ2\mu_{t_{2}}\models\Phi_{2}, and for any t1𝒯1[0,t1)t_{1}^{\prime}\in\mathcal{T}_{1}\cap[0,t_{1}) and t2𝒯2[0,t2)t_{2}^{\prime}\in\mathcal{T}_{2}\cap[0,t_{2}), μt1Φ0\mu_{t_{1}^{\prime}}\models\Phi_{0} and μt2Φ1\mu_{t_{2}^{\prime}}\models\Phi_{1}, where μt=eQtμt+\mu_{t}=e^{Qt}\mu\ \forall t\in\mathbb{R}^{+}.

Before solving the model-checking problem of CTMCs against CLL formulas in the next section, we shall first discuss what can be specified in our logic CLL.

Given a CTMC (S,Q)(S,Q), CLL path formula [0,1000]s,[1,1]\Diamond^{[0,1000]}\langle s,[1,1]\rangle expresses a liveness property that state sSs\in S is eventually reached with probability one before time instant 10001000. In terms of safety properties, formula [100,1000]s,[0,0]\Box^{[100,1000]}\langle s,[0,0]\rangle represents that state sSs\in S is never reached (reached with probability zero) between time instants 100100 and 10001000. Furthermore, setting the intervals nontrivial (neither [0,0][0,0] or [1,1][1,1]), liveness and safety properties can be asserted with probabilities, such as [0,1000]s,[0.5,1]\Diamond^{[0,1000]}\langle s,[0.5,1]\rangle and [100,1000]s,[0,0.5]\Box^{[100,1000]}\langle s,[0,0.5]\rangle. For multiphase timed until formula s,[0.7,1]U[2,3]s,[0.7,1]U[2,3]s,[0.7,1],\langle s,[0.7,1]\rangle U^{[2,3]}\langle s,[0.7,1]\rangle\ldots U^{[2,3]}\langle s,[0.7,1]\rangle, where the number of U[2,3]U^{[2,3]} is 100, asserts that the probability of state ss is beyond 0.70.7 in every time instant 22 to 33, and this happens at least 100 times.

Next, we can classify members of \mathscr{I} as representing “low” and “high” probabilities. For example, if \mathscr{I} contains 3 intervals {[0,0.1],(0.1,0.9),[0.9,1]}\{[0,0.1],(0.1,0.9),[0.9,1]\}, we can declare the first interval as “low” and the last interval as “high”. In this case [10,1000)(s0,[0,0.1]s1,[0.9,1])\Box^{[10,1000)}(\langle s_{0},[0,0.1]\rangle\rightarrow\langle s_{1},[0.9,1]\rangle) says that, in time interval [10,1000)[10,1000), whenever the probability of state s0s_{0} is low, the probability of state s1s_{1} will be high.

6 CLL Model Checking

In this section, we provide an algorithm to model check CTMCs against CLL formulas, i.e., the following CLL model-checking problem — Problem 1 is decidable.

Problem 1 (CLL Model-checking Problem)

Given a symbolized CTMC 𝒮=(S,Q,)\mathcal{SM}=(S,Q,\mathscr{I}) with an initial distribution μ\mu and a CLL path formula φ\varphi on AP=S×AP=S\times\mathscr{I}, the goal is to decide whether σμφ\sigma_{\mu}\models\varphi, where σμ(t)=eQtμ\sigma_{\mu}(t)=e^{Qt}\mu is an execution path defined in Eq.(1).

In particular, we show that

Theorem 6.1

Under the condition that Schanuel’s conjecture holds, the CLL model-checking problem in Problem 1 is decidable.

In the following, we prove the above theorem from checking basic formulas — atomic propositions to the most complex one — nontrivial multiphase timed until formulas. For readability, we put the proofs of all results in Appendix 0.A.

We start with the simplest case of atomic proposition s,\langle s,\mathcal{I}\rangle. By the semantics of CLL, μts,\mu_{t}\models\langle s,\mathcal{I}\rangle if and only if μt=eQtμ(s)\mu_{t}=e^{Qt}\mu(s)\in\mathcal{I}. To check this, we first observe that the execution path eQtμe^{Qt}\mu of CTMCs is a system of polynomial exponential functions (PEFs).

Definition 8

A function f:f:\mathbb{R}\to\mathbb{R} is a polynomial-exponential function (PEF) if ff has the following form:

f(t)=k=0Kfk(t)eλktf(t)=\sum_{k=0}^{K}f_{k}(t)e^{\lambda_{k}t} (6)

where for all 0kK<0\leq k\leq K<\infty, fk(t)𝔽1[t],fk(t)0,f_{k}(t)\in\mathbb{F}_{1}[t],f_{k}(t)\not=0, λk𝔽2\lambda_{k}\in\mathbb{F}_{2} and 𝔽1,𝔽2\mathbb{F}_{1},\mathbb{F}_{2} are fields. Without loss of generality, we assume that λk\lambda_{k}’s are distinct.

Generally, for a PEF f(t)f(t) with the range in complex numbers \mathbb{C}, g(t)=f(t)+f(t)g(t)=f(t)+f^{*}(t) is a PEF with the range in real numbers \mathbb{R}, where f(t)f^{*}(t) is the complex conjugate of f(t)f(t). The factor tt is omitted whenever convenient, i.e., f=f(t)f=f(t). tt is called a root of a function ff if f(t)=0f(t)=0. PEFs often appear in transcendental number theory as auxiliary functions in the proofs involving the exponential function [31].

Lemma 1

Given a CTMC =(S,Q)\mathcal{M}=(S,Q) with S={s0,,sd1}S=\{s_{0},\ldots,s_{d-1}\}, Qd×dQ\in\mathbb{Q}^{d\times d}, and an initial distribution μd×1\mu\in\mathbb{Q}^{d\times 1}, for any 0id10\leq i\leq d-1 , eQtμ(si)e^{Qt}\mu(s_{i}), the ii-th entry of eQtμe^{Qt}\mu, can be expressed as a PEF f:+[0,1]f:\mathbb{R}^{+}\rightarrow[0,1] as in Eq.(6) with 𝔽1=𝔽2=𝔸\mathbb{F}_{1}=\mathbb{F}_{2}=\mathbb{A}.

By the above lemma, for a given tt in some bounded time interval 𝒯\mathcal{T} (to be specific in the latter discussion), eQtμ(s)e^{Qt}\mu(s)\in\mathcal{I} is determined by the algebraic structure of PEF g(t)=eQtμ(s)g(t)=e^{Qt}\mu(s) in 𝒯\mathcal{T}. That is all maximum intervals 𝒯max𝒯\mathcal{T}_{\max}\subseteq\mathcal{T} such that g(t)g(t)\in\mathcal{I} for all t𝒯maxt\in\mathcal{T}_{\max}, where interval 𝒯max\mathcal{T}_{\max}\not=\emptyset is called maximum for g(t)g(t)\in\mathcal{I} if no sub-intervals 𝒯𝒯max\mathcal{T}^{\prime}\subsetneq\mathcal{T}_{\max} such that the property holds, i.e., g(t)g(t)\in\mathcal{I} for all t𝒯t\in\mathcal{T}^{\prime}. Then eQtμ(s)e^{Qt}\mu(s)\in\mathcal{I} if and only if t𝒯maxt\in\mathcal{T}_{\max} for some maximum interval 𝒯max\mathcal{T}_{\max}. So, we aim to compute the set 𝒯\mathscr{T} of all maximum intervals. By the continuity of PEF g(t)g(t), this can be done by identifying a real root isolation of the following PEF f(t)f(t) in 𝒯\mathcal{T}: f(t)=(g(t)inf)(g(t)sup).f(t)=(g(t)-\inf\mathcal{I})(g(t)-\sup\mathcal{I}).

A (real) root isolation of function f(t)f(t) in interval 𝒯\mathcal{T} is a set of mutually disjoint intervals, denoted by Iso(f)𝒯={(aj,bj)𝒯}\textrm{Iso}(f)_{\mathcal{T}}=\{(a_{j},b_{j})\subseteq\mathcal{T}\} for aj,bja_{j},b_{j}\in\mathbb{Q} such that

  • for any jj, there is one and only one root of f(t)f(t) in (aj,bj)(a_{j},b_{j});

  • for any root tt^{*} of f(t)f(t), t(aj,bj)t^{*}\in(a_{j},b_{j}) for some jj.

Furthermore, if ff has no any root in 𝒯\mathcal{T}, then Iso(f)𝒯=\textrm{Iso}(f)_{\mathcal{T}}=\emptyset.

Although there are infinite kinds of real root isolations of f(t)f(t) in 𝒯\mathcal{T}, the number of isolation intervals equals to the number of distinct roots of f(t)f(t) in 𝒯\mathcal{T}.

Finding real root isolations of PEFs is a long-standing problem and can be at least backtracked to Ritt’s paper [32] in 1929. Some following results were obtained since the last century (e.g. [33, 34]). This problem is essential in the reachability analysis of dynamical systems, one active field of symbolic and algebraic computation. In the case of 𝔽1=\mathbb{F}_{1}=\mathbb{Q} and 𝔽2=+\mathbb{F}_{2}=\mathbb{N}^{+} in [19], an algorithm named ISOL was proposed to isolate all real roots of f(t)f(t). Later, this algorithm has been extended to the case of 𝔽1=\mathbb{F}_{1}=\mathbb{Q} and 𝔽2=\mathbb{F}_{2}=\mathbb{R} [20]. A variant of the problem has also been studied in [21]. The correctness of these algorithms is based on Schanuel’s conjecture. Other works are using Schanuel’s conjecture to do the root isolation of other functions, such as exp-log functions [35] and tame elementary functions [36].

By Lemma 1, we pursue this problem in the context of CTMCs. The distinct feature of solving real root isolations of PEFs in our paper is to deal with complex numbers \mathbb{C}, more specifically algebraic numbers 𝔸\mathbb{A}, i.e., 𝔽1=𝔽2=𝔸\mathbb{F}_{1}=\mathbb{F}_{2}=\mathbb{A}. At the same time, to the best of our knowledge, all the previous works can only handle the case over \mathbb{R}. Here, we develop a state-of-the-art real root isolation algorithm for PEFs over algebraic numbers. Thus from now on, we always assume that PEFs are over 𝔸\mathbb{A}, i.e., 𝔽1=𝔽2=𝔸\mathbb{F}_{1}=\mathbb{F}_{2}=\mathbb{A} in Eq.(6). In this case, it is worth noting that whether a PEF has a root in a given interval, 𝒯+\mathcal{T}\subseteq\mathbb{R}^{+} is decidable subject to Schanuel’s Conjecture if 𝒯\mathcal{T} is bounded [37], which falls in the situation we consider in this paper.

Theorem 6.2 ([37])

Under the condition that Schanuel’s conjecture holds, there is an algorithm to check whether a PEF f(t)f(t) has a root in interval 𝒯\mathcal{T}, i.e., whether Iso(f)𝒯=\textrm{Iso}(f)_{\mathcal{T}}=\emptyset.

In this paper, we extend the above checking Iso(f)𝒯=\textrm{Iso}(f)_{\mathcal{T}}=\emptyset to computing Iso(f)𝒯\textrm{Iso}(f)_{\mathcal{T}} of PEF f(t)f(t).

Theorem 6.3

Under the condition that Schanuel’s conjecture holds, there is an algorithm to find real root isolation Iso(f)𝒯\textrm{Iso}(f)_{\mathcal{T}} for any PEF f(t)f(t) and interval 𝒯\mathcal{T}. Furthermore, the number of real roots is finite, i.e., |Iso(f)𝒯|<|\textrm{Iso}(f)_{\mathcal{T}}|<\infty.

We can compute the set 𝒯\mathscr{T} of all maximum intervals with the above theorem to check atomic propositions. Furthermore, we can compare the values of any real roots of PEFs, which is important in model checking general multiphase timed until formulas at the end of this section.

Lemma 2

Let f1(t)f_{1}(t) and f2(t)f_{2}(t) be two PEFs with the domains in 𝒯1\mathcal{T}_{1} and 𝒯2\mathcal{T}_{2}, and t1𝒯1t_{1}\in\mathcal{T}_{1} and t2𝒯2t_{2}\in\mathcal{T}_{2} are roots of them, respectively. Under the condition that Schanuel’s conjecture holds, there is an efficient way to check whether or not t1t2<gt_{1}-t_{2}<g for any given rational number gg\in\mathbb{Q}.

For model checking general state formula Φ\Phi, we can also use real root isolation of some PEF to obtain the set of all maximum intervals 𝒯max\mathcal{T}_{\max} such that μtΦ\mu_{t}\models\Phi for all t𝒯maxt\in\mathcal{T}_{\max}. The reason is that Φ\Phi admits conjunctive normal form consisting of atomic propositions. See the proof of the following lemma in Appendix 0.A.

Lemma 3

Under the condition that Schanuel’s conjecture holds, given a time interval 𝒯\mathcal{T}, the set 𝒯\mathscr{T} of all maximum intervals in 𝒯\mathcal{T} satisfying μtΦ\mu_{t}\models\Phi can be computed, where Φ\Phi is a state formula of CLL. Furthermore, the number of all intervals in 𝒯\mathscr{T} is finite; the left and right endpoints of each interval in 𝒯\mathscr{T} are roots of PEFs.

At last, we characterize the multiphase timed until formulas by the reachability analysis of time intervals (instants).

Lemma 4

σμΦ0U𝒯1Φ1U𝒯2Φ2U𝒯nΦn\sigma_{\mu}\models\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\cdots U^{\mathcal{T}_{n}}\Phi_{n} if and only if there exist time intervals {k+}k=0n\{\mathcal{I}_{k}\subseteq\mathbb{R}^{+}\}_{k=0}^{n} with 0=[0,0]\mathcal{I}_{0}=[0,0] such that

  • The satisfaction of intervals: for all 1kn1\leq k\leq n, μtΦk1{\mu_{t}}\models\Phi_{k-1} for all tkt\in\mathcal{I}_{k}, and μtΦn{\mu_{t^{*}}}\models\Phi_{n}, where t=supnt^{*}=\sup\mathcal{I}_{n} and μt=eQtμt+\mu_{t}=e^{Qt}\mu\ \forall t\in\mathbb{R}^{+};

  • The order of intervals: for all 1kn1\leq k\leq n, kk1+𝒯k\mathcal{I}_{k}\subseteq\mathcal{I}_{k-1}+\mathcal{T}_{k} and infk=supk1+inf𝒯k\inf\mathcal{I}_{k}=\sup\mathcal{I}_{k-1}+\inf\mathcal{T}_{k}.

By the above lemma, the problem of checking multiphase timed until formulas is reduced to verify the existence of a sequence of time intervals.

Now we can show the proof of Theorem 6.1.

Proof

Recall that the nontrivial step is to model check multiphase timed until formula Φ0U𝒯1Φ1U𝒯2Φ2U𝒯nΦn,\Phi_{0}U^{\mathcal{T}_{1}}\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\cdots U^{\mathcal{T}_{n}}\Phi_{n}, where {𝒯j}j=1n\{\mathcal{T}_{j}\}_{j=1}^{n} is a set of bounded rational intervals in +\mathbb{R}^{+}, and for 0kn+10\leq k\leq n+1, Φk\Phi_{k} is a state formula.

By Lemma 4, for model checking the above formula, we only need to check the existence of time intervals {k}k=0n\{\mathcal{I}_{k}\}_{k=0}^{n} illustrated in the lemma. The following procedure can construct such a set of intervals if it exists:

  • (1) Let 0={0=[0,0]}\mathscr{I}_{0}=\{\mathcal{I}_{0}=[0,0]\} ;

  • (2) For each 1kn1\leq k\leq n, obtaining the set k\mathscr{I}_{k} in [0,j=1ksup𝒯j][0,\sum_{j=1}^{k}\sup\mathcal{T}_{j}] of all maximum intervals such that μtΦk1\mu_{t}\models\Phi_{k-1} for all tt\in\mathcal{I} of \mathcal{I}\in\mathscr{I}, where μt=eQtμ\mu_{t}=e^{Qt}\mu; this can be done by Lemma 3. Noting that k\mathscr{I}_{k} can be the empty set, i.e., k=\mathscr{I}_{k}=\emptyset;

  • (3) Let kk from 11 to nn. First, updating k\mathscr{I}_{k}:

    k={(+𝒯k):k and k1}.\displaystyle\mathscr{I}_{k}=\{\mathcal{I}\cap(\mathcal{I}^{\prime}+\mathcal{T}_{k}):\mathcal{I}\in\mathscr{I}_{k}\text{ and }\mathcal{I}^{\prime}\in\mathscr{I}_{k-1}\}. (7)

    The above updates can be finished by Lemma 2. If k=\mathscr{I}_{k}=\emptyset, then the formula is not satisfied;

  • (4) Updating n\mathscr{I}_{n}: for each n\mathcal{I}\in\mathscr{I}_{n}, we replace \mathcal{I} with [sε,s)[s-\varepsilon,s) for some constant ε>0\varepsilon>0 if there is an ss\in\mathcal{I} with sεs-\varepsilon\in\mathcal{I} such that μsΦn\mu_{s}\models\Phi_{n} where μs=eQsμ\mu_{s}=e^{Qs}\mu; Otherwise, remove this element from n\mathscr{I}_{n}. Again, this can be done by Lemma 3. If n=\mathscr{I}_{n}=\emptyset, then the formula is not satisfied;

  • (5) Finally, let kk from n1n-1 to 11, updating k\mathscr{I}_{k}:

    k={[sinf𝒯k,sinf𝒯k]:[sε,s)k+1]}.\mathscr{I}_{k}=\{[s-\inf\mathcal{T}_{k},s-\inf\mathcal{T}_{k}]:[s-\varepsilon,s)\in\mathscr{I}_{k+1}]\}.

Thus after the above procedure, we have non-empty sets {k}k=0n\{\mathscr{I}_{k}\}_{k=0}^{n} with the following properties.

  • for each 1kn1\leq k\leq n, μtΦk1\mu_{t}\models\Phi_{k-1} for all tkt\in\mathcal{I}_{k} and kk\mathcal{I}_{k}\in\mathscr{I}_{k}, and μtΦn\mu_{t^{*}}\models\Phi_{n}, where t=supnt^{*}=\sup\mathcal{I}_{n};

  • for each 1kn1\leq k\leq n, k\mathcal{I}\in\mathscr{I}_{k}, there exists at least one k1\mathcal{I}^{\prime}\in\mathscr{I}_{k-1} such that sup+𝒯k\mathcal{I}\subseteq\sup\mathcal{I}^{\prime}+\mathcal{T}_{k} and inf=sup+inf𝒯k\inf\mathcal{I}=\sup\mathcal{I}^{\prime}+\inf\mathcal{T}_{k}.

Therefore, we can get a set of intervals {k}k=0n\{\mathcal{I}_{k}\}_{k=0}^{n} satisfying the two conditions in Lemma 4 if it exists. On the other hand, it is easy to check that all such {k}k=0n\{\mathcal{I}_{k}\}_{k=0}^{n} must be in {k}k=0n\{\mathscr{I}_{k}\}_{k=0}^{n}, i.e., for each kk, k\mathcal{I}_{k}\subseteq\mathcal{I} for some k\mathcal{I}\in\mathscr{I}_{k}. This ensures the correctness of the above procedure.

By the above constructive analysis, we give an algorithm for model checking CTMCs against CLL formulas. Focusing on the decidability problem, we do not provide the pseudocode of the algorithm. Alternatively, we implement a numerical experiment to illustrate the checking procedure in the next section.

7 Numerical Implementation

In this section, we implement a case study of checking CTMCs against CLL formulas. Here, we consider a symbolized CTMC 𝒮=(S,Q,)\mathcal{SM}=(S,Q,\mathscr{I}), where =(S,Q)\mathcal{M}=(S,Q) is the CTMC in Example 1 and finite set \mathscr{I} is the one considered in Eq.(3). We check the properties of \mathcal{M} given by the following two CLL path formulas mentioned in the introduction for different initial distributions.

φ\displaystyle\varphi =s1,[0,0.1]U[0,5]s0,[0.9,1].\displaystyle=\langle s_{1},[0,0.1]\rangle U^{[0,5]}\langle s_{0},[0.9,1]\rangle.
φ\displaystyle\varphi^{\prime} =s0,[0.9,1]U[3,7]s1,[0,0.1]U[0,5]s0,[0.9,1].\displaystyle=\langle s_{0},[0.9,1]\rangle U^{[3,7]}\langle s_{1},[0,0.1]\rangle U^{[0,5]}\langle s_{0},[0.9,1]\rangle.

By Jordan decomposition, we have Q=SJS1Q=SJS^{-1} where

S=(0600002001730003301044100)J=(7000003000000000000000000)S1=(11401700160000821047012703710131000).S=\left(\begin{matrix}0&-6&0&0&0\\ 0&2&0&0&1\\ -7&-3&0&0&0\\ 3&3&0&1&0\\ 4&4&1&0&0\end{matrix}\right)\qquad J=\left(\begin{matrix}-7&0&0&0&0\\ 0&-3&0&0&0\\ 0&0&0&0&0\\ 0&0&0&0&0\\ 0&0&0&0&0\end{matrix}\right)\qquad S^{-1}=\left(\begin{matrix}\frac{1}{14}&0&-\frac{1}{7}&0&0\\ -\frac{1}{6}&0&0&0&0\\ \frac{8}{21}&0&\frac{4}{7}&0&1\\ \frac{2}{7}&0&\frac{3}{7}&1&0\\ \frac{1}{3}&1&0&0&0\end{matrix}\right).

Then, we consider an initial distribution μ\mu as the same as the one in Example 1. Then we have that the value of eQtμe^{Qt}\mu is as follows:

(e3t000013(e3t1)100012(e3te7t)0e7t00314e7t12e3t+27037e7t+371027e7t23e3t+821047e7t+4701)(0.10.20.30.40)=(110e3t130e3t+730120e3t+14e7t120e3t328e7t+3970115e3t17e7t+22105).\left(\begin{matrix}e^{-3t}&0\qquad&0\qquad&0\qquad&0\\ -\frac{1}{3}(e^{-3t}-1)&1&0&0&0\\ \frac{1}{2}(e^{-3t}-e^{-7t})&0&e^{-7t}&0&0\\ \frac{3}{14}e^{-7t}-\frac{1}{2}e^{-3t}+\frac{2}{7}&0&-\frac{3}{7}e^{-7t}+\frac{3}{7}&1&0\\ \frac{2}{7}e^{-7t}-\frac{2}{3}e^{-3t}+\frac{8}{21}&0&-\frac{4}{7}e^{-7t}+\frac{4}{7}&0&1\end{matrix}\right)\left(\begin{matrix}0.1\\ 0.2\\ 0.3\\ 0.4\\ 0\end{matrix}\right)=\left(\begin{matrix}\frac{1}{10}e^{-3t}\\ -\frac{1}{30}e^{-3t}+\frac{7}{30}\\ \frac{1}{20}e^{-3t}+\frac{1}{4}e^{-7t}\\ -\frac{1}{20}e^{-3t}-\frac{3}{28}e^{-7t}+\frac{39}{70}\\ -\frac{1}{15}e^{-3t}-\frac{1}{7}e^{-7t}+\frac{22}{105}\end{matrix}\right).

As we only consider states s0s_{0} and s1s_{1} in formulas φ\varphi and φ\varphi^{\prime}, we focus on the following PEFs: f0(t)=110e3tf_{0}(t)=\frac{1}{10}e^{-3t} and f1(t)=130e3t+730f_{1}(t)=-\frac{1}{30}e^{-3t}+\frac{7}{30}.

Next, we initialize the model checking procedures introduced in the proof of Theorem 6.1. First, we compute the set 𝒯\mathscr{T} of all maximum intervals 𝒯[0,5]\mathcal{T}\subseteq[0,5] such that eQtμs0,[0.9,1]e^{Qt}\mu\models\langle s_{0},[0.9,1]\rangle for t𝒯t\in\mathcal{T}, i.e., f0(t)[0.9,1]f_{0}(t)\in[0.9,1] for t𝒯t\in\mathcal{T}. We obtain 𝒯=\mathscr{T}=\emptyset by the real root isolation algorithm mentioned in Theorem 6.3, and this indicates that σμ⊧̸φ\sigma_{\mu}\not\models\varphi where σμ(t)=eQtμ\sigma_{\mu}(t)=e^{Qt}\mu is the path induced by μ\mu and defined in Eq.(1).

To check whether σμφ\sigma_{\mu}\models\varphi^{\prime}, we compute the set 𝒯\mathscr{T} of all maximum intervals 𝒯[0,12]\mathcal{T}\subseteq[0,12] such that eQtμs0,[0.9,1]e^{Qt}\mu\models\langle s_{0},[0.9,1]\rangle for t𝒯t\in\mathcal{T}, i.e., f0(t)[0.9,1]f_{0}(t)\in[0.9,1] for t𝒯t\in\mathcal{T}. Again, we obtain 𝒯=\mathscr{T}=\emptyset by the real root isolation algorithm in Theorem 6.3. Therefore, σμ⊧̸φ\sigma_{\mu}\not\models\varphi^{\prime}.

In the following, we consider a different initial distribution μ1\mu_{1} as follows:

eQtμ1=eQt(0.900.100)=(910e3t310(e3t1)920e3t720e7t920e3t+320e7t+31035e3t+15e7t+25).e^{Qt}\mu_{1}=e^{Qt}\left(\begin{matrix}0.9\\ 0\\ 0.1\\ 0\\ 0\end{matrix}\right)=\left(\begin{matrix}\frac{9}{10}e^{-3t}\\ -\frac{3}{10}(e^{-3t}-1)\\ \frac{9}{20}e^{-3t}-\frac{7}{20}e^{-7t}\\ -\frac{9}{20}e^{-3t}+\frac{3}{20}e^{-7t}+\frac{3}{10}\\ -\frac{3}{5}e^{-3t}+\frac{1}{5}e^{-7t}+\frac{2}{5}\end{matrix}\right).

The key PEFs are: g0(t)=910e3tg_{0}(t)=\frac{9}{10}e^{-3t} and g1(t)=310(e3t1).g_{1}(t)=-\frac{3}{10}(e^{-3t}-1).

Again, we initialize the model checking procedures introduced in the proof of Theorem 6.1. We first compute the set 𝒯\mathscr{T} of all maximum intervals 𝒯[0,5]\mathcal{T}\subseteq[0,5] such that eQtμ1s1,[0,0.1]e^{Qt}\mu_{1}\models\langle s_{1},[0,0.1]\rangle for t𝒯t\in\mathcal{T}, i.e., g1(t)[0,0.1]g_{1}(t)\in[0,0.1] for t𝒯t\in\mathcal{T}. This can be done by finding a real root isolation of the following PEF: g10(t)=310(e3t1)110.g_{1}^{0}(t)=-\frac{3}{10}(e^{-3t}-1)-\frac{1}{10}.

By implementing the real root isolation algorithm in Theorem 6.3, we have

Iso(g10)[0,5]={(0.13,0.14)} and then 𝒯={[0,t]} for t(0.13,0.14).\textrm{Iso}{(g_{1}^{0})}_{[0,5]}=\{(0.13,0.14)\}\text{ and then }\mathscr{T}=\{[0,t^{*}]\}\text{ for }t^{*}\in(0.13,0.14).

Following the same way, we compute 𝒯\mathscr{T} for eQtμ1s0,[0.9,1]e^{Qt}\mu_{1}\models\langle s_{0},[0.9,1]\rangle. Then we complete the model checking procedures in the proof of Theorem 6.1, and we conclude: σμ1φ\sigma_{\mu_{1}}\models\varphi. By repeating these, the result of the second formula φ\varphi^{\prime} is σμ1⊧̸φ.\sigma_{\mu_{1}}\not\models\varphi^{\prime}.

8 Related Works

Agrawal et al. [16] introduced probabilistic linear-time temporal logic (PLTL) to reason about discrete-time Markov chains in the context of distribution transformers as we did for CTMCs in this paper. Interestingly, the Skolem Problem can be reduced to the model checking problem for the logic PLTL [38]. The Skolem Problem asks whether a given linear recurrence sequence has a zero term and plays a vital role in the reachability analysis of linear dynamical systems. Unfortunately, the decidability of the problem remains open [39]. Recently, the Continuous Skolem Problem has been proposed with good behavior (the problem is decidable) and forms a fundamental decision problem concerning reachability in continuous-time linear dynamical systems [37]. Not surprisingly, the Continuous Skolem Problem can be reduced to model-checking CLL. The primary step of verifying CLL formulas is to find a real root isolation of a PEF in a given interval. Chonev, Ouaknine and Worrell reformulated the Continuous Skolem Problem in terms of whether a PEF has a root in a given interval, which is decidable subject to Schanuel’s conjecture [37]. An algorithm for finding root isolation can also answer the problem of checking the existence of the roots of a PEF. However, the reverse does not work in general. Therefore, the decidability of the Continuous Skolem Problem cannot be applied to establish that of our CLL model checking.

Remark 1

By adopting the method in this paper, we established the decidability of model checking quantum CTMCs against signal temporal logic [40]. Again, we need Schanuel’s conjecture to guarantee the correctness. A Lindblad’s master equation governs a quantum CTMC and a more general real-time probabilistic Markov model than a CTMC, i.e., a CTMC is an instance of quantum CTMCs. We converted the evolution of Lindblad’s master equation into a distribution transformer that preserves the laws of quantum mechanics. We reduced the model-checking problem of quantum CTMCs to the real root isolation problem, which we considered in this paper, and thus our method could be applied to it.

9 Conclusion

This paper revisited the study of temporal properties of finite-state CTMCs by symbolizing the probability value space [0,1][0,1] into a finite set of intervals. To specify relatively and absolutely temporal properties, we propose a probabilistic logic for CTMCs, namely continuous linear-time logic (CLL). We have considered the model checking problem in this setting. Our main result is that a state-of-the-art real root isolation algorithm over the field of algebraic numbers was proposed to establish the decidability of the model checking problem under the condition that Schanuel’s conjecture holds.

This paper aims to show decidability in as simple a fashion as possible without paying much attention to complexity issues. Faster algorithms on our current constructions would significantly improve from a practical standpoint.

Acknowledgments

We want to thank Professor Joost-Pieter Katoen for his invaluable feedback and for pointing out the references [12, 13, 23]. This work is supported by the National Key R&\&D Program of China (Grant No: 2018YFA0306701), the National Natural Science Foundation of China (Grant No: 61832015), ARC Discovery Program (#DP210102449) and ARC DECRA (#DE180100156).

References

  • [1] Andrei Kolmogoroff. Über die analytischen methoden in der wahrscheinlichkeitsrechnung. Mathematische Annalen, 104(1):415–458, 1931.
  • [2] Hans Hansson and Bengt Jonsson. A logic for reasoning about time and reliability. Formal Aspects of Computing, 6(5):512–535, 1994.
  • [3] Adnan Aziz, Kumud Sanwal, Vigyan Singhal, and Robert Brayton. Model-checking continuous-time Markov chains. ACM Transactions on Computational Logic, 1(1):162–170, 2000.
  • [4] Christel Baier, Boudewijn Haverkort, Holger Hermanns, and J-P Katoen. Model-checking algorithms for continuous-time Markov chains. IEEE Transactions on Software Engineering, 29(6):524–541, 2003.
  • [5] Lijun Zhang, David N Jansen, Flemming Nielson, and Holger Hermanns. Automata-based CSL model checking. In International Colloquium on Automata, Languages, and Programming, pages 271–282. Springer, 2011.
  • [6] Marta Kwiatkowska, Gethin Norman, and David Parker. PRISM: Probabilistic symbolic model checker. In International Conference on Modelling Techniques and Tools for Computer Performance Evaluation, pages 200–204. Springer, 2002.
  • [7] Joost-Pieter Katoen, Ivan S Zapreev, Ernst Moritz Hahn, Holger Hermanns, and David N Jansen. The ins and outs of the probabilistic model checker MRMC. Performance Evaluation, 68(2):90–104, 2011.
  • [8] Christian Dehnert, Sebastian Junges, Joost-Pieter Katoen, and Matthias Volk. A storm is coming: A modern probabilistic model checker. In International Conference on Computer Aided Verification, pages 592–600. Springer, 2017.
  • [9] Joost-Pieter Katoen. The probabilistic model checking landscape. In Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, pages 31–45. ACM, 2016.
  • [10] Benoi^\hat{i}t Barbot, Taolue Chen, Tingting Han, Joost-Pieter Katoen, and Alexandru Mereacre. Efficient CTMC model checking of linear real-time objectives. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pages 128–142. Springer, 2011.
  • [11] Taolue Chen, Tingting Han, Joost-Pieter Katoen, and Alexandru Mereacre. Quantitative model checking of continuous-time Markov chains against timed automata specifications. In 2009 24th Annual IEEE Symposium on Logic In Computer Science, pages 309–318. IEEE, 2009.
  • [12] Taolue Chen, Tingting Han, Joost-Pieter Katoen, and Alexandru Mereacre. Model checking of continuous-time Markov chains against timed automata specifications. Logical Methods in Computer Science, 7(1), Mar 2011.
  • [13] Taolue Chen, Tingting Han, Joost-Pieter Katoen, and Alexandru Mereacre. Observing continuous-time mdps by 1-clock timed automata. In International Workshop on Reachability Problems, pages 2–25. Springer, 2011.
  • [14] Yijun Feng, Joost-Pieter Katoen, Haokun Li, Bican Xia, and Naijun Zhan. Monitoring CTMCs by multi-clock timed automata. In International Conference on Computer Aided Verification, pages 507–526. Springer, 2018.
  • [15] Taolue Chen, Marco Diciolla, Marta Kwiatkowska, and Alexandru Mereacre. Time-bounded verification of CTMCs against real-time specifications. In International Conference on Formal Modeling and Analysis of Timed Systems, pages 26–42. Springer, 2011.
  • [16] Manindra Agrawal, Sundararaman Akshay, Blaise Genest, and PS Thiagarajan. Approximate verification of the symbolic dynamics of Markov chains. Journal of the ACM (JACM), 62(1):2, 2015.
  • [17] Rajeev Alur and David L. Dill. A theory of timed automata. Theoretical Computer Science, 126:183–235, 1994.
  • [18] Rajeev Alur, Thomas A Henzinger, and Moshe Y Vardi. Parametric real-time reasoning. In Proceedings of the Twenty-fifth Annual ACM Symposium on Theory of Computing, pages 592–601, 1993.
  • [19] Melanie Achatz, Scott McCallum, and Volker Weispfenning. Deciding polynomial-exponential problems. In Proceedings of the Twenty-first International Symposium on Symbolic and Algebraic Computation, pages 215–222. ACM, 2008.
  • [20] Ting Gan, Mingshuai Chen, Yangjia Li, Bican Xia, and Naijun Zhan. Reachability analysis for solvable dynamical systems. IEEE Transactions on Automatic Control, 63(7):2003–2018, 2017.
  • [21] Jing-Cao Li, Cheng-Chao Huang, Ming Xu, and Zhi-Bin Li. Positive root isolation for poly-powers. In Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, pages 325–332. ACM, 2016.
  • [22] Serge Lang. Introduction to transcendental numbers. Addison-Wesley Pub. Co., 1966.
  • [23] Rupak Majumdar, Mahmoud Salamati, and Sadegh Soudjani. On Decidability of Time-Bounded Reachability in CTMDPs. In Artur Czumaj, Anuj Dawar, and Emanuela Merelli, editors, 47th International Colloquium on Automata, Languages, and Programming (ICALP 2020), volume 168 of Leibniz International Proceedings in Informatics (LIPIcs), pages 133:1–133:19, Dagstuhl, Germany, 2020. Schloss Dagstuhl–Leibniz-Zentrum für Informatik.
  • [24] Shaull Almagor, Edon Kelmendi, Joël Ouaknine, and James Worrell. Invariants for continuous linear dynamical systems. arXiv preprint arXiv:2004.11661, 2020.
  • [25] Ming Xu and Yuxin Deng. Time-bounded termination analysis for probabilistic programs with delays. Information and Computation, 275:104634, 2020.
  • [26] Henri Cohen. A course in computational algebraic number theory, volume 138. Springer Science & Business Media, 2013.
  • [27] Daniel Richardson. How to recognize zero. Journal of Symbolic Computation, 24(6):627–645, 1997.
  • [28] Yu Nesterenko. Modular functions and transcendence problems. Comptes rendus de l’Académie des sciences. Série 1, Mathématique, 322(10):909–914, 1996.
  • [29] Angus Macintyre and Alex J Wilkie. On the decidability of the real exponential field. 1996.
  • [30] Giuseppina Terzo. Some consequences of Schanuel’s conjecture in exponential rings. Communications in Algebra®, 36(3):1171–1189, 2008.
  • [31] Alan Baker. Transcendental number theory. Cambridge university press, 1990.
  • [32] Joseph Fels Ritt. On the zeros of exponential polynomials. Transactions of the American Mathematical Society, 31(4):680–686, 1929.
  • [33] Cerino E Avellar and Jack K Hale. On the zeros of exponential polynomials. Journal of Mathematical Analysis and Applications, 73(2):434–452, 1980.
  • [34] Robert Tijdeman. On the number of zeros of general exponential polynomials. In Indagationes Mathematicae (Proceedings), volume 74, pages 1–7. North-Holland, 1971.
  • [35] Adam Strzebonski. Real root isolation for exp-log functions. In Proceedings of the Twenty-first International Symposium on Symbolic and Algebraic Computation, pages 303–314, 2008.
  • [36] Adam Strzebonski. Real root isolation for tame elementary functions. In Proceedings of the 2009 International Symposium on Symbolic and Algebraic Computation, pages 341–350, 2009.
  • [37] Ventsislav Chonev, Joël Ouaknine, and James Worrell. On the Skolem Problem for Continuous Linear Dynamical Systems. In Ioannis Chatzigiannakis, Michael Mitzenmacher, Yuval Rabani, and Davide Sangiorgi, editors, 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016), volume 55 of Leibniz International Proceedings in Informatics (LIPIcs), pages 100:1–100:13, Dagstuhl, Germany, 2016. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.
  • [38] S. Akshay, Timos Antonopoulos, Joël Ouaknine, and James Worrell. Reachability problems for Markov chains. Information Processing Letters, 115(2):155–158, 2015.
  • [39] Joël Ouaknine and James Worrell. Decision problems for linear recurrence sequences. In International Workshop on Reachability Problems, pages 21–28. Springer, 2012.
  • [40] Ming Xu, Jingyi Mei, Ji Guan, and Nengkun Yu. Model Checking Quantum Continuous-Time Markov Chains. In Serge Haddad and Daniele Varacca, editors, 32nd International Conference on Concurrency Theory (CONCUR 2021), volume 203 of Leibniz International Proceedings in Informatics (LIPIcs), pages 13:1–13:17, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik.
  • [41] Taolue Chen, Nengkun Yu, and Tingting Han. Continuous-time orbit problems are decidable in polynomial-time. Information Processing Letters, 115(1):11–14, 2015.
  • [42] Christel Baier and Joost-Pieter Katoen. Principles of model checking. MIT press, 2008.
  • [43] Rüdiger Loos. Computing in algebraic extensions. In Computer Algebra, pages 173–187. Springer, 1982.
  • [44] Cheng-Chao Huang, Jing-Cao Li, Ming Xu, and Zhi-Bin Li. Positive root isolation for poly-powers by exclusion and differentiation. Journal of Symbolic Computation, 85:148–169, 2018.
  • [45] Michael Trott. The Mathematica guidebook for symbolics. Springer Science & Business Media, 2007.

Appendix 0.A Appendices: Proofs

0.A.1 Proof of Lemma 1

We need to use the Jordan decomposition to prove Lemma 1.

Definition 9

A Jordan block is a square matrix of the following form.

[λ1000λ101000λ].\left[\begin{matrix}\lambda&1&0&\cdots&0\\ 0&\lambda&1&\cdots&0\\ &&\ddots&\ddots&\\ &&&\ddots&1\\ 0&0&0&\cdots&\lambda\end{matrix}\right].

A square matrix JJ is in Jordan norm form if

J=[J1J2Jn],J=\left[\begin{matrix}J_{1}&&&&\\ &J_{2}&&&\\ &&&\ddots&\\ &&&&J_{n}\end{matrix}\right],

where JkJ_{k} is a Jordan block for each 1kn1\leq k\leq n.

Because 𝔸\mathbb{A} is algebraic closed, we know that

Proposition 1 ([41])

Any matrix An×nA\in\mathbb{Q}^{n\times n} is algebraically similar to a matrix in Jordan normal form over the algebraic number field 𝔸\mathbb{A}. Namely, there exists some invertible P𝔸n×nP\in\mathbb{A}^{n\times n} and J𝔸n×nJ\in\mathbb{A}^{n\times n} in Jordan form such that A=P1JPA=P^{-1}JP, where 𝔸n×n\mathbb{A}^{n\times n} is the set of all nn-by-nn matrices with every entry being algebraic numbers.

Now we can give the proof of Lemma 1.

Proof

As the elements of μ\mu are rational, we only need to prove that any entry of eQte^{Qt} can be expressed as a finite sum of kfk(t)eηkt\sum_{k}f_{k}(t)e^{\eta_{k}t} for ηk𝔸\eta_{k}\in\mathbb{A} and fk(t)𝔸[t]f_{k}(t)\in\mathbb{A}[t].

By Proposition 1, we have that there is a P𝔸n×nP\in\mathbb{A}^{n\times n} such that Q=P1(kJk)PQ=P^{-1}(\oplus_{k}J_{k})P such that

Jk=[λk1000λk10000λk,]J_{k}=\left[\begin{matrix}\lambda_{k}&1&0&\cdots&0\\ 0&\lambda_{k}&1&\cdots&0\\ &&&\ddots&\\ 0&0&0&\cdots&\lambda_{k},\end{matrix}\right]

where λk\lambda_{k} is an eigenvalue of QQ and Qd×dQ\in\mathbb{Q}^{d\times d}, so λk\lambda_{k} is algebraic. Furthermore, Jk𝔸nk×nkJ_{k}\in\mathbb{A}^{n_{k}\times n_{k}}, where nkn_{k} is the dimension of JkJ_{k}.

Therefore, eQt=P1ekJktP=P1(keJkt)Pe^{Qt}=P^{-1}e^{\oplus_{k}J_{k}t}P=P^{-1}(\oplus_{k}e^{J_{k}t})P. We complete the proof by proving that for each kk, any entry of eJkte^{J_{k}t} can be expressed as a finite sum of kfk(t)eηkt\sum_{k}f_{k}(t)e^{\eta_{k}t} for ηk𝔸\eta_{k}\in\mathbb{A} and fk(t)𝔸[t]f_{k}(t)\in\mathbb{A}[t]. Computing eJkte^{J_{k}t}, we obtain that

eJkt=[eλktteλktt2eλkt/2!tkneλkt/nk!0eλktteλkttnk1eλkt/(nk1)!000eλkt].e^{J_{k}t}=\left[\begin{matrix}e^{\lambda_{k}t}&te^{\lambda_{k}t}&t^{2}e^{\lambda_{k}t}/{2!}&\cdots&t^{n}_{k}e^{\lambda_{k}t}/{n_{k}!}\\ 0&e^{\lambda_{k}t}&te^{\lambda_{k}t}&\cdots&t^{n_{k}-1}e^{\lambda_{k}t}/{(n_{k}-1)!}\\ &&&\ddots&\\ 0&0&0&\cdots&e^{\lambda_{k}t}\par\end{matrix}\right].

0.A.2 Proof of Lemma 2

Before proving, we need the following fact observed in [3] according to the Lindemann-Weierstrass theorem.

Observation 1

Given a real number rr\in\mathbb{R} of the form kμkeηk\sum_{k}\mu_{k}e^{\eta_{k}} where μks{\mu_{k}}^{\prime}s and ηks{\eta_{k}}^{\prime}s are algebraic complex numbers, and the ηks{\eta_{k}}^{\prime}s are pairwise distinct, there is an effective procedure to compare the values of rr and cc for any cc\in\mathbb{Q}.

According to Lindemann-Weierstrass theorem, we know that r=cr=c if and only if r=c=0r=c=0 or c=μkc=-\mu_{k} for some kk with ηk=0\eta_{k}=0. Otherwise, we can compute a good approximation of rr. For each kk, eηke^{\eta_{k}} can be approximated with an error, the norm of the difference between rr and the approximation, of less than ε\varepsilon (for any ε<1\varepsilon<1) by taking the first 3|ηk|2/ε+1\lceil 3|\eta_{k}|^{2}/\varepsilon\rceil+1 terms of the Maclaurin expansion for eηke^{\eta_{k}}. This leads to an approximation of rr within k|μk|ε\sum_{k}|\mu_{k}|\varepsilon. Since the individual terms in the Maclaurin expansion are algebraic functions of the ηk\eta_{k}’s, it follows that the approximations are algebraic. Then we can check if r>cr>c by the comparision between the approximations and cc. See [3] for more details.

Proof

First, by Theorem 6.3, isolating the real roots of f1(t)f_{1}(t) and f2(t)f_{2}(t), we have t1(a1,b1)t_{1}\in(a_{1},b_{1}) and t2(a2,b2)t_{2}\in(a_{2},b_{2}) for a1,a2,b1,b2a_{1},a_{2},b_{1},b_{2}\in\mathbb{Q}. Then we first check if t1t2=gt_{1}-t_{2}=g. Note that t1t2=gt_{1}-t_{2}=g if and only if f12(t)+f22(t+g)=0f_{1}^{2}(t)+f_{2}^{2}(t+g)=0 has a root in (a1g,b1g)(a2,b2)(a_{1}-g,b_{1}-g)\cap(a_{2},b_{2}). f12(t)+f22(t+g)f_{1}^{2}(t)+f_{2}^{2}(t+g) is still a PEF, then we can check whether or not there is a root of it in (a1,b1)(a2,b2)(a_{1},b_{1})\cup(a_{2},b_{2}) by Theorem 6.2.

If t1t2gt_{1}-t_{2}\not=g, we answer whether or not t1(t2+g)<0t_{1}-(t_{2}+g)<0 by narrowing (a1,b1)(a_{1},b_{1}) and (a2,b2)(a_{2},b_{2}) and maintaining the roots of f1(t)f_{1}(t) and f2(t)f_{2}(t) in the intervals. This can be done as we can arbitrarily narrow the interval (a1,b1)(a_{1},b_{1}) by comparing the signs (>0>0, <0<0 or =0=0) of f(a1+b12)f(\frac{a_{1}+b_{1}}{2}) and f(a1)f(a_{1}), and the same way works for narrowing (a2,b2)(a_{2},b_{2}). The sign of f(a)f(a) for any aa\in\mathbb{Q} can be obtained by Observation 1 and Theorem 2.1. Moreover, there is a gap between t1t_{1} and t2+gt_{2}+g, and we can compare t1t_{1} and (t2+g)(t_{2}+g) by continuously narrowing (a1,b1)(a_{1},b_{1}) and (a2,b2)(a_{2},b_{2}), and comparing a1a_{1} and b2b_{2} (a2a_{2} and b1b_{1}).

0.A.3 Proof of Lemma 3

Proof

Recall that state formulas of CLL are given by the following grammar:

Φ:=𝐭𝐫𝐮𝐞aAP¬ΦΦ1Φ2.\Phi:=\mathbf{true}\mid a\in AP\mid\neg\Phi\mid\Phi_{1}\land\Phi_{2}.

By the semantics of CLL state formulas, Φk\Phi_{k} is a formula of propositional logics. So Φ\Phi admits conjunctive normal form (CNF) [42, Appendix A.3], i.e.,

Φ=jJlLjlitj,l,\Phi=\land_{j\in J}\lor_{l\in L_{j}}lit_{j,l},

where litj,llit_{j,l} is a literal of aAPa\in AP or ¬a\neg a, and JkJ_{k} and LkL_{k} are both finite sets. Furthermore, we observe that ¬a\neg a is (semantically equivalent to) either an atomic proposition or a disjunction of two atomic propositions. To prove this, let a=k,𝒯a=\langle k,\mathcal{T}\rangle for some interval 𝒯\mathcal{T}. We deal with the case of 𝒯=[c1,c2]\mathcal{T}=[c_{1},c_{2}] for 0<c1<c2<10<c_{1}<c_{2}<1, and the other situations of 𝒯\mathcal{T} can be done by the similar way. In this case, for any distribution μ𝒟(𝒮)\mu\in\mathcal{D(S)}, μ¬a\mu\models\neg a if and only if μa1a2\mu\models a_{1}\lor a_{2}, i.e. ¬a=a1a2\neg a=a_{1}\lor a_{2}, where a1=k,[0,c1)a_{1}=\langle k,[0,c_{1})\rangle and a2=k,(c2,1]a_{2}=\langle k,(c_{2},1]\rangle. Therefore,

Φ=jJlLjaj,l\Phi=\land_{j\in J^{\prime}}\lor_{l\in L^{\prime}_{j}}a_{j,l}

for some finite sets JJ^{\prime}, LjL^{\prime}_{j} for jJj\in J^{\prime}, {aj,lAP}jJ,lLj\{a_{j,l}\in AP\}_{j\in J^{\prime},l\in L^{\prime}_{j}}.

From μtjJlLjaj,l\mu_{t}\models\land_{j\in J^{\prime}}\lor_{l\in L^{\prime}_{j}}a_{j,l}, by the semantic of CLL, we have that for all jJj\in J^{\prime}, μtaj,l\mu_{t}\models a_{j,l} for some lLjl\in L^{\prime}_{j}. As JJ^{\prime} and all LjL^{\prime}_{j} are finite sets, we can check one by one whether or not μtaj,l\mu_{t}\models a_{j,l}. Let 𝒯j,l\mathscr{T}_{j,l} be the set of all the maximum intervals such that for each 𝒯𝒯j,l\mathcal{T}\in\mathscr{T}_{j,l}, μtaj,l\mu_{t}\models a_{j,l} for all t𝒯t\in\mathcal{T}. Then

𝒯=jJ𝒯j,\mathscr{T}=\cap_{j\in J^{\prime}}\mathscr{T}_{j},

where

𝒯j={𝒯1𝒯2:𝒯1𝒯j,l1 and 𝒯2𝒯j,l2 for all distinct l1,l2Lj} for all jJ,\mathscr{T}_{j}=\{\mathcal{T}_{1}\cup\mathcal{T}_{2}:\mathcal{T}_{1}\in\mathscr{T}_{j,l_{1}}\textrm{ and }\mathcal{T}_{2}\in\mathscr{T}_{j,l_{2}}\textrm{ for all distinct }l_{1},l_{2}\in L^{\prime}_{j}\}\textrm{ for all }j\in J^{\prime},

and

𝒯i𝒯j={𝒯1𝒯2:𝒯1𝒯i and 𝒯2𝒯j} for all i,jJ.\mathscr{T}_{i}\cap\mathscr{T}_{j}=\{\mathcal{T}_{1}\cap\mathcal{T}_{2}:\mathcal{T}_{1}\in\mathscr{T}_{i}\textrm{ and }\mathcal{T}_{2}\in\mathscr{T}_{j}\}\textrm{ for all }i,j\in J^{\prime}.

The left problem is to handle 𝒯1𝒯2\mathcal{T}_{1}\cap\mathcal{T}_{2} and 𝒯1𝒯2\mathcal{T}_{1}\cup\mathcal{T}_{2}, and by the continuity of PEFs, the left and right endpoints of 1\mathcal{I}_{1} and 2\mathcal{I}_{2} are all the roots of PEFs. It is equivalent to compare the values of two real roots of two (different) PEFs. This can be done by Lemma 2.

0.A.4 Proof of Lemma 4

Proof

We first prove the sufficient direction. Let

φ1=Φ1U𝒯2Φ2U𝒯nΦn.\varphi_{1}=\Phi_{1}U^{\mathcal{T}_{2}}\Phi_{2}\cdots U^{\mathcal{T}_{n}}\Phi_{n}.

Then the above formula is Φ0U𝒯1φ1\Phi_{0}U^{\mathcal{T}_{1}}\varphi_{1}. By the semantic of CLL, we have that there is a time t1𝒯1t_{1}\in\mathcal{T}_{1} such that σμt1φ1\sigma_{\mu_{t_{1}}}\models\varphi_{1}, and for any t1[0,t)𝒯1t_{1}^{\prime}\in[0,t)\cap\mathcal{T}_{1}, μt1Φ0{\mu_{t_{1}^{\prime}}}\models\Phi_{0}. Then let

φ2=Φ2U𝒯3Φ3U𝒯nΦn\varphi_{2}=\Phi_{2}U^{\mathcal{T}_{3}}\Phi_{3}\cdots U^{\mathcal{T}_{n}}\Phi_{n}

and we get φ1=Φ1U𝒯2φ2\varphi_{1}=\Phi_{1}U^{\mathcal{T}_{2}}\varphi_{2}. In the similar way, we have that there is a time t2𝒯2t_{2}\in\mathcal{T}_{2} such that σμt1+t2φ2\sigma_{\mu_{t_{1}+t_{2}}}\models\varphi_{2}, and for any t2[0,t2)𝒯2t_{2}^{\prime}\in[0,t_{2})\cap\mathcal{T}_{2}, μt1+t2Φ1{\mu_{t_{1}+t_{2}^{\prime}}}\models\Phi_{1}. Iteratively, we get a set of time instants {tk}k=0n\{t_{k}\}_{k=0}^{n} with t0=0t_{0}=0. For all 1kn1\leq k\leq n, let

k=j=0k1tj+[0,tk)𝒯k.\mathcal{I}_{k}=\sum_{j=0}^{k-1}t_{j}+[0,t_{k})\cap\mathcal{T}_{k}.

Then it is easy to check that {k+}k=0\{\mathcal{I}_{k}\in\mathbb{R}^{+}\}_{k=0} with 0=[0,0]\mathcal{I}_{0}=[0,0] are the desired intervals satisfying the above two conditions.

Considering the necessary direction, by the above proof, we only need to identify {tk}k=1n\{t_{k}\}_{k=1}^{n} throughout intervals {k}k=0n\{\mathcal{I}_{k}\}_{k=0}^{n}. Let tk=supksupk1t_{k}=\sup\mathcal{I}_{k}-\sup\mathcal{I}_{k-1} for all 1kn1\leq k\leq n.

0.A.5 Proof of Theorem 6.3

Before presenting the proof of Theorem 6.3, we recall one useful technique from previous works — factoring PEFs.

0.A.5.1 Factoring PEFs

An essential step of finding a real root isolation of a PEF is factoring it into a set of PEFs, such that the resulting PEFs have no multiple roots except for zero. In the following, we introduce a technique to implement this. Before that, we recall some concepts.

Given a root tt^{*} of a function f(t)f(t), i.e., f(t)=0f(t^{*})=0, the multiplicity of tt^{*} is the maximum number mm such that (tt)m(t-t^{*})^{m} is a factor of f(t)f(t), i.e., there exists a function g(t)g(t) such that f(t)=g(t)(tt)mf(t)=g(t)(t-t^{*})^{m}. In particular, if m=1m=1, then we call that tt^{*} is a single root; otherwise tt^{*} is a multiple root.

Recall a PEF f:f:\mathbb{R}\to\mathbb{R} has the following form:

f(t)=k=0Kfk(t)eλktf(t)=\sum_{k=0}^{K}f_{k}(t)e^{\lambda_{k}t} (8)

where for all 0kK<0\leq k\leq K<\infty, fk(t)𝔸[t]f_{k}(t)\in\mathbb{A}[t], λk𝔸\lambda_{k}\in\mathbb{A}. Without loss of generality, we assume λk\lambda_{k}’s are distinct, and use Exp(f)\textrm{Exp}(f) to denote the set of exponent of f(t)f(t), i.e., Exp(f)={λk}k=0K\textrm{Exp}(f)=\{\lambda_{k}\}_{k=0}^{K}.

Let {aj}j=1n\{a_{j}\}_{j=1}^{n} be a linearly independent basis over \mathbb{Q} of the exponents Exp(f)={λk}k=0K\textrm{Exp}(f)=\{\lambda_{k}\}_{k=0}^{K} appearing in f(t)f(t) such that f(t)f(t) is a multivariate polynomial with respect to t,ea1t,,eantt,e^{a_{1}t},\ldots,e^{a_{n}t}, denoted by

f(t,ea1t,,eant).f(t,e^{a_{1}t},\ldots,e^{a_{n}t}).

This basis can be obtained by computing a simple extension (e.g. [43], [44, Algorithm 1])

(λ)/=(λ0,,λK)/.\mathbb{Q}(\lambda)/\mathbb{Q}=\mathbb{Q}(\lambda_{0},\ldots,\lambda_{K})/\mathbb{Q}.

Next, we replace tt by the indeterminate y0y_{0}, and each exponential term eaite^{a_{i}t} by yiy_{i} for 1in1\leq i\leq n. Then, we have a multivariate polynomial representation f(y0,,yn)f(y_{0},\ldots,y_{n}) of f(t)f(t) in the ysy^{\prime}s. By the factorization of polynomials, we have

f(y0,,yn)=f1m1(y0,,yn)fsms(y0,,yn)form1,,ms+f(y_{0},\ldots,y_{n})=f_{1}^{m_{1}}(y_{0},\ldots,y_{n})\cdots f_{s}^{m_{s}}(y_{0},\ldots,y_{n})\quad\textit{for}\quad m_{1},\ldots,m_{s}\in\mathbb{Z}^{+}

whose greatest square free part is denoted by

f^(y0,,yn)=f1(y0,,yn)f1(y0,,yn).\hat{f}(y_{0},\ldots,y_{n})=f_{1}(y_{0},\ldots,y_{n})\cdots f_{1}(y_{0},\ldots,y_{n}).

Via switching ysy^{\prime}s back by eaite^{a_{i}t} and tt, we have a PEF

f^(t)=f^(t,ea1t,,eant).\hat{f}(t)=\hat{f}(t,e^{a_{1}t},\ldots,e^{a_{n}t}). (9)

It is worth noting that the set of roots of f^(t)\hat{f}(t) is the same to the one of f(t)f(t). In the latter, we will prove f^(t)\hat{f}(t) only has single roots.

At last, a corollary of Schanuel’s conjecture is also needed to prove Theorem 6.3.

Corollary 1

[20, Corollary 3] Let a1,,ana_{1},\ldots,a_{n} be algebraic numbers that are linearly independent over \mathbb{Q}. Under the condition that Schanuel’s conjecture holds, the transcendence degree of the extension field (t,ea1t,,eant)\mathbb{Q}(t,e^{a_{1}t},\ldots,e^{a_{n}t}) is at least nn if t0t\not=0.

0.A.5.2 Main Proof

In this subsection, we prove Theorem 6.3 with the help of the exclusion algorithm in [44, Algorithm 2] which can compute a real root isolation Iso(f)𝒯\textrm{Iso}{(f)}_{\mathcal{T}} for a given simple PEF f(t)f(t) and interval 𝒯\mathcal{T}. Here, a PEF f(t)f(t) is simple if all roots of f(t)f(t) are single.

In particular, if f(t)f(t) has only single roots in 𝒯\mathcal{T} (there is no t𝒯t\in\mathcal{T} such that f(t)=f(t)=0f(t)=f^{\prime}(t)=0), then we can get a real root isolation Iso(f)𝒯\textrm{Iso}(f)_{\mathcal{T}} by [44, Algorithm 2]. Otherwise, f(t)f(t) has at least one multiple root, and thus the exclusion algorithm in [44] cannot be used to compute a real root isolation of f(t)f(t) directly. This can be dealt with by employing factoring PEFs in the last section and the following fact.

Lemma 5

Let f(t)=f(t,ea1t,,eant)f(t)=f(t,e^{a_{1}t},\ldots,e^{a_{n}t}) be a PEF with respect to tt, and thus a polynomial with respect to t,ea1t,,eantt,e^{a_{1}t},\ldots,e^{a_{n}t}, where {ai}i=1n\{a_{i}\}_{i=1}^{n} is linearly independent over \mathbb{Q}. If the multivariate polynomial representation f(y0,,yn)f(y_{0},\ldots,y_{n}) of f(t)f(t) is square free, then, assuming that Schanuel’s conjecture holds, f(t)f(t) has no multiple real root except 0.

Proof

Since f(y0,,yn)f(y_{0},\ldots,y_{n}) is square free, we may write

f(y0,,yn)=f1(y0,,yn)f1(y0,,yn)f(y_{0},\ldots,y_{n})=f_{1}(y_{0},\ldots,y_{n})\cdots f_{1}(y_{0},\ldots,y_{n})

where for any 1i,jn1\leq i,j\leq n, iji\not=j, fi(y0,,yn)f_{i}(y_{0},\ldots,y_{n}) is irreducible, and fi(y0,,yn)f_{i}(y_{0},\ldots,y_{n}) and fj(y0,,yn)f_{j}(y_{0},\ldots,y_{n}) are coprime, i.e., they do not share a polynomial g(y0,,yn)g(y_{0},\ldots,y_{n}) as a factor.

By contradiction, we first prove that

fi(t,ea1t,,eant) and fj(t,ea1t,,eant)f_{i}(t,e^{a_{1}t},\ldots,e^{a_{n}t})\textit{ and }f_{j}(t,e^{a_{1}t},\ldots,e^{a_{n}t})

have no nonzero common real root with respect to tt. Assume that t00t_{0}\not=0 is a common real root of fi(t,ea1t,,eant)f_{i}(t,e^{a_{1}t},\ldots,e^{a_{n}t}) and fj(t,ea1t,,eant)f_{j}(t,e^{a_{1}t},\ldots,e^{a_{n}t}). By Corollary 1, we have that the transcendence degree of (t0,ea1t0,,eant0)\mathbb{Q}(t_{0},e^{a_{1}t_{0}},\ldots,e^{a_{n}t_{0}}) is at least nn. Thus there must exist nn elements in {t0,ea1t0,,eant0}\{t_{0},e^{a_{1}t_{0}},\ldots,e^{a_{n}t_{0}}\} that are algebraically independent. Without loss of generality, let {t0,ea1t0,,ean1t0}\{t_{0},e^{a_{1}t_{0}},\ldots,e^{a_{n-1}t_{0}}\} be the nn elements that are algebraically independent. Considering the multivariate polynomial representation, let g(y0,,yn)g(y_{0},\ldots,y_{n}) be the resultant [45, Page 26] of fi(y0,,yn)f_{i}(y_{0},\ldots,y_{n}) and fj(y0,,yn)f_{j}(y_{0},\ldots,y_{n}) with respect to yny_{n}. Then (t0,ea1t0,,ean1t0)(t_{0},e^{a_{1}t_{0}},\ldots,e^{a_{n-1}t_{0}}) is a root of g(y0,y1,,yn1)g(y_{0},y_{1},\ldots,y_{n-1}), which is a nontrivial polynomial as

fi(t,ea1t,,eant) and fj(t,ea1t,,eant)f_{i}(t,e^{a_{1}t},\ldots,e^{a_{n}t})\textit{ and }f_{j}(t,e^{a_{1}t},\ldots,e^{a_{n}t})

are coprime. Therefore, (t0,ea1t0,,eant0)(t_{0},e^{a_{1}t_{0}},\ldots,e^{a_{n}t_{0}}) is a root of some nontrivial polynomial. This contradicts that {t0,ea1t0,,eant0}\{t_{0},e^{a_{1}t_{0}},\ldots,e^{a_{n}t_{0}}\} are algebraically independent.

Next, we prove that fi(t,ea1t,,eant)f_{i}(t,e^{a_{1}t},\ldots,e^{a_{n}t}) has no multiple real root. Suppose

fi(t,ea1t,,eant)=h0(t)+k=1shk(t)(ea1t)bk1(eant)bknf_{i}(t,e^{a_{1}t},\ldots,e^{a_{n}t})=h_{0}(t)+\sum_{k=1}^{s}h_{k}(t)(e^{a_{1}t})^{b_{k1}}\cdots(e^{a_{n}t})^{b_{kn}}

where h0(t),,hn(t)h_{0}(t),\ldots,h_{n}(t) are nontrivial polynomials and bjkb_{jk}\in\mathbb{N} for 1js1\leq j\leq s and 1kn1\leq k\leq n. Then we have

fi(t,ea1t,,eant)\displaystyle f_{i}^{\prime}(t,e^{a_{1}t},\ldots,e^{a_{n}t})
=\displaystyle= h0(t)+k=1s[hk(t)+hk(t)(a1bk1++anbkn)](ea1t)bk1(eant)bkn.\displaystyle h_{0}^{\prime}(t)+\sum_{k=1}^{s}[h_{k}^{\prime}(t)+h_{k}^{\prime}(t)(a_{1}b_{k1}+\cdots+a_{n}b_{kn})](e^{a_{1}t})^{b_{k1}}\cdots(e^{a_{n}t})^{b_{kn}}.

Moreover, considering the corresponding multivariate polynomial representation,

fi(y0,y1,,yn)=h0(y0)+k=1shk(y0)(y1)bk1(yn)bkn\displaystyle f_{i}(y_{0},y_{1},\ldots,y_{n})=h_{0}(y_{0})+\sum_{k=1}^{s}h_{k}(y_{0})(y_{1})^{b_{k1}}\cdots(y_{n})^{b_{kn}}
fi(y0,y1,,yn)\displaystyle f_{i}^{{}^{\prime}}(y_{0},y_{1},\ldots,y_{n})
=\displaystyle= h0(y0)+k=1s[hk(y0)+hk(y0)(a1bk1++anbkn)](y1)bk1(yn)bkn.\displaystyle h_{0}^{\prime}(y_{0})+\sum_{k=1}^{s}[h_{k}^{{}^{\prime}}(y_{0})+h_{k}^{{}^{\prime}}(y_{0})(a_{1}b_{k1}+\cdots+a_{n}b_{kn})](y_{1})^{b_{k1}}\cdots(y_{n})^{b_{kn}}.

From the degree of h0(y0)h_{0}(y_{0}) in the above two polynomials, it is evident to see that fi(y0,y1,,yn)f_{i}(y_{0},y_{1},\ldots,y_{n}) is not a factor of fi(y0,y1,,yn)f_{i}^{{}^{\prime}}(y_{0},y_{1},\ldots,y_{n}). Then, fi(y0,y1,,yn)f_{i}(y_{0},y_{1},\ldots,y_{n}) and fi(y0,y1,,yn)f_{i}^{{}^{\prime}}(y_{0},y_{1},\ldots,y_{n}) are coprime, since fi(y0,y1,,yn)f_{i}(y_{0},y_{1},\ldots,y_{n}) is irreducible. For the same reason as above, fi(t,ea1t,,eant)f_{i}(t,e^{a_{1}t},\ldots,e^{a_{n}t}) and fi(t,ea1t,,eant)f_{i}^{{}^{\prime}}(t,e^{a_{1}t},\ldots,e^{a_{n}t}) have no common real roots. Therefore, fi(t,ea1t,,eant)f_{i}(t,e^{a_{1}t},\ldots,e^{a_{n}t}) has no multiple real root.

By the above lemma, for finding a real root isolation Iso(f)𝒯\textrm{Iso}{(f)}_{\mathcal{T}} of a PEF f(t)f(t) in some time interval 𝒯\mathcal{T}, we first implement the method of factoring PEFs in the last section to get a simple PEF f^(t)\hat{f}(t), which shares the same roots with f(t)f(t). Then we can implement the exclusion algorithm in [44] to achieve this goal. Finally, we complete the proof of Theorem 6.3 by noting that the number of obtained real root isolations by the algorithm is finite (see the correctness analysis of [44, Algorithm 2]), i.e., |Iso(f)𝒯|<|\textrm{Iso}{(f)}_{\mathcal{T}}|<\infty.